Sei sulla pagina 1di 5

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

SILABUS
NAMA SEKOLAH MATA PELAJARAN KELAS/SEMESTER STANDAR KOMPETENSI KODE ALOKASI WAKTU KOMPETENSI DASAR
1. Identify and describe the various networking threats

: SMK Telekomunikasi Tunas Harapan : Network Security : XI / Genap : Network Security : CCNAD1-8 : 34 X 45 menit KEGIATAN PEMBELAJARAN
Describe the risks and cost associated with network security failures. Differentiate the four categories of security threats. Differentiate external and internal security threats. Explain and differentiate social engineering techniques that target network security including pretexting, phishing, and vhishing.

MATERI PEMBELAJARAN
The significance of network security breaches The four categories of network threats External and internal security threats Social Engineering techniques as a mechanism for exploiting human weaknesses Information is a valuable commodity that can be bought, sold, and stolen.

INDIKATOR
Students will often think of network security failures as software based. Their understanding of hacking is usually limited to the process whereby a talented software programmer breaks the code of a network and accesses critical and valuable data, or simply places a virus or worm in a network that causes performance problems. Seldom do students think of the social engineering aspect of network security and how vulnerable users are on an individual level. Students often think of spam, pop-ups, and cookies as annoying

PENILAIAN
Tes Tertulis Tes Praktek Tugas

ALOKASI WAKTU TM
2

PS
4 (8)

PI
2 (8)

SUMBER BELAJAR
CCN A Discovery Course Inter net Softw are Simulator Jaringan Komputer

2. Identify different methods of attack


.

Viruses, worms, and Trojan Horses Denial of Service Attacks

Differentiate viruses, worms, and Trojan Horses, as software-based threats to network security.

Tes Tertulis Tes Praktek Tugas

4 (8)

2 (8)

CCN A Discovery Course

PROGRAM KEAHLIAN: TEKNIK KOMPUTER DAN JARINGAN

SILABUS - Network Security Halaman 1 dari 5

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR

MATERI PEMBELAJARAN
(DoS) Distributed Denial of Services Attacks (DDoS) Brute Force Attacks Privacy invading tools including spyware, cookies, adware, and pop-ups Spam

KEGIATAN PEMBELAJARAN
Explain, demonstrate, and differentiate "synchronous flooding" and "ping to death" as common DoS methods of attack. Differentiate DDoS from DoS as a threat to large-scale networks. Explain a Brute Force attack as flooding of the login function of a network. Define and differentiate the use of spyware, cookies, adware, and popups and explain how these tools invade network user privacy. Explain how spam can threaten network performance. Define the components of a network security policy. Demonstrate the process of constructing a network security policy. Define the components of network security procedures. Demonstrate the process of constructing network security procedures. Introduce and demonstrate key network security tools and applications. Explain how to detect viruses in a network. Introduce the firewall as product for securing networks. Define and differentiate appliance based, server based, integrated, and

INDIKATOR
intrusions. However, the fact that these programs have a negative impact on the overall performance of a network is a new concept for most students. They generally will not have thought through the trade-offs associated with blocking the messages for security purposes and the impact on user access and user experience. Differentiating organizational policies and procedures is a new concept for most students at this level. While students will have been introduced to policies and procedures in organizations in which they have participated, they may think of these concepts as the same thing and fail to understand their hierarchical relationship. A firewall resides between two or more networks and controls the traffic between them

PENILAIAN

ALOKASI WAKTU TM PS PI

SUMBER BELAJAR
Inter net Softw are Simulator Jaringan Komputer

3. Describe security procedures and applications

The network security policy Network security procedures Network security tools and applications

Tes Tertulis Tes Praktek Tugas

5 (10)

2 (8)

CCN A Discovery Course Inter net Softw are Simulator Jaringan Komputer

4. Describe the features of a firewall and how it can be used to


.

The firewall as one of the most effective tools in network security Filtering schemes

Tes Tertulis Tes Praktek Tugas

5 (10)

2 (8)

CCN A Discovery Course Inter

PROGRAM KEAHLIAN: TEKNIK KOMPUTER DAN JARINGAN

SILABUS - Network Security Halaman 2 dari 5

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR
protect against an attack

MATERI PEMBELAJARAN
implemented in firewalls Firewall implementation of Network Address Translation (NAT) The differing forms and structures of firewalls Tools for testing network security Recommended practices for securing networks

KEGIATAN PEMBELAJARAN
personal firewalls. Explain packet filtering. Explain Application/Web Site filtering. Illustrate the architecture of a firewall implementation. Define and illustrate the role of a demilitarized zone (DMZ) or extranet. Differentiate and illustrate single firewall configurations and two firewall configurations. Illustrate the use of Integrated Router's in enabling network security in the home and small business. Introduce and demonstrate the use of a vulnerability analysis tool. Discuss the recommended practices for securing a network.

INDIKATOR
as well as helps prevent unauthorized access. Packet filtering is a way to deny or allow access to packets based on MAC and IP addresses. Application/Web Site filtering denies or allows access based on application, keyword, or URL addresses. Stateful Packet Inspection is a tool for filtering unsolicited packets. Network Address Translation is a scheme to protect internal network addresses from external users. Firewalls are implemented between the internal network (intranet) and the Internet. A demilitarized zone, or extranet is an area of a network that is accessible to both internal and external user. Single firewall configurations use three separate interfaces on a

PENILAIAN

ALOKASI WAKTU TM PS PI

SUMBER BELAJAR
net Softw are Simulator Jaringan Komputer

PROGRAM KEAHLIAN: TEKNIK KOMPUTER DAN JARINGAN

SILABUS - Network Security Halaman 3 dari 5

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR

MATERI PEMBELAJARAN

KEGIATAN PEMBELAJARAN

INDIKATOR
single router, with one interface for the external network, one for the internal network, and one for the DMZ network. Two firewall configurations use two routers to separate internal and external firewall with the DMZ located between them. Integrated Router's and other home networking devices frequently support DMZ and often include Network Address Translation (NAT), Stateful Packet Inspection (SPI) and IP, Application and web site filtering capabilities. Vulnerability analysis tools, known as security scanners, test host and network security.

PENILAIAN

ALOKASI WAKTU TM PS PI

SUMBER BELAJAR

Keterangan
TM PS PI
.

: Tatap Muka : Praktek di Sekolah (2 jam praktik di sekolah setara dengan 1 jam tatap muka) : Praktek di Industri (4 jam praktik di Du/ Di setara dengan 1 jam tatap muka)
SILABUS - Network Security Halaman 4 dari 5

PROGRAM KEAHLIAN: TEKNIK KOMPUTER DAN JARINGAN

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

PROGRAM KEAHLIAN: TEKNIK KOMPUTER DAN JARINGAN

SILABUS - Network Security Halaman 5 dari 5

Potrebbero piacerti anche