0% found this document useful (0 votes)
19 views4 pages

COMP40002 - Networking Concepts and Cyber Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

COMP40002 - Networking Concepts and Cyber Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Module Descriptors

NETWORKING CONCEPTS
AND CYBER SECURITY
COMP40002

Key Facts
School of Digital, Technologies and Arts
Level 4
30 credits

Contact
Leader: Christopher Howard
Email: [email protected]

Hours of Study
Scheduled Learning and Teaching Activities: 104
Independent Study Hours: 196
Total Learning Hours: 300

Pattern of Delivery
Occurrence A, Stoke Campus, UG Semester 1 to UG Semester 2
Occurrence A, Stoke Campus, UG Semester 2
Occurrence B, Digital Institute London, UG Semester 1 to UG Semester 2
Occurrence B, Digital Institute London, UG Semester 2
Occurrence C, APIIT LANKA (PVT) LTD - Colombo, UG Semester 2 to UG Semester 3
Occurrence C, APIIT LANKA (PVT) LTD - Colombo, UG Semester 3
Occurrence D, British University Vietnam Hanoi, UG Semester 1 to UG Semester 2
Occurrence D, British University Vietnam Hanoi, UG Semester 2
Occurrence E, APIIT LANKA (PVT) LTD - Colombo, UG Semester 1
Occurrence E, APIIT LANKA (PVT) LTD - Colombo, UG Semester 3 to UG Semester 1
Occurrence F, APIIT LANKA (PVT) LTD - Colombo, UG Semester 1 to UG Semester 2
Occurrence F, APIIT LANKA (PVT) LTD - Colombo, UG Semester 2
Occurrence G, APIIT LANKA (PVT) LTD - Colombo, UG Semester 1
Occurrence G, APIIT LANKA (PVT) LTD - Colombo, UG Semester 2 to UG Semester 1
Occurrence G, APIIT LANKA (PVT) LTD - Colombo, UG Semester 3
Occurrence H, APIIT LANKA (PVT) LTD - Colombo, UG Semester 1
Occurrence H, APIIT LANKA (PVT) LTD - Colombo, UG Semester 2
Occurrence H, APIIT LANKA (PVT) LTD - Colombo, UG Semester 3 to UG Semester 2
Occurrence I, APIIT LANKA (PVT) LTD - Kandy, UG Semester 1 to UG Semester 2
Occurrence I, APIIT LANKA (PVT) LTD - Kandy, UG Semester 2
Occurrence J, APIIT LANKA (PVT) LTD - Colombo, UG Semester 2 to UG Semester 3
Occurrence J, APIIT LANKA (PVT) LTD - Colombo, UG Semester 3
Occurrence L, APIIT LANKA (PVT) LTD - Kandy, UG Semester 2 to UG Semester 3
Occurrence L, APIIT LANKA (PVT) LTD - Kandy, UG Semester 3
Occurrence M, APIIT LANKA (PVT) LTD - Colombo, UG Semester 1
Occurrence M, APIIT LANKA (PVT) LTD - Colombo, UG Semester 3 to UG Semester 1
Occurrence N, APIIT LANKA (PVT) LTD - Kandy, UG Semester 1
Occurrence N, APIIT LANKA (PVT) LTD - Kandy, UG Semester 3 to UG Semester 1
Occurrence O, APIIT LANKA (PVT) LTD - Colombo, UG Semester 1
Occurrence O, APIIT LANKA (PVT) LTD - Colombo, UG Semester 2 to UG Semester 1
Occurrence O, APIIT LANKA (PVT) LTD - Colombo, UG Semester 3
Occurrence P, APIIT LANKA (PVT) LTD - Kandy, UG Semester 1
Occurrence P, APIIT LANKA (PVT) LTD - Kandy, UG Semester 2 to UG Semester 1
Occurrence P, APIIT LANKA (PVT) LTD - Kandy, UG Semester 3

Sites
APIIT LANKA (PVT) LTD - Colombo
British University Vietnam Hanoi
Digital Institute London
APIIT LANKA (PVT) LTD - Kandy
Stoke Campus

Assessment
Group Assignment 1 - (2000-3000 words) weighted at 50%
Group Assignment 2 - (2000-3000 words) weighted at 50%

Module Details
Module Learning Outcomes

1. DEMONSTRATE A KNOWLEDGE OF THE OSI MODEL, TCP/IP MODEL AND IP ADDRESSING


AND NETWORK DESIGN (SUBNETTING), AS WELL AS FUNDAMENTAL INTRODUCTORY
CONCEPTS OF CYBER SECURITY. Knowledge and Understanding
Learning

2. EXPLAIN AND USE LAYER 2 AND 3 BASED TECHNOLOGY SUCH AS VLANS, THE SPANNING-
TREE PROTOCOL, NETWORK MANAGEMENT PRINCIPLES, ROUTING PROTOCOLS AND
ASSOCIATED TOOLS. Application
Communication

3. PERFORM PC, ROUTER, SWITCH, AND WAN INSTALLATION, CONFIGURATION AND


TROUBLESHOOTING INCLUDING ACCESS CONTROL LISTS IN EXTENSIVE ROUTER BASED
INTERNETWORKS AND DO SO IN A RESPONSIBLE AND SAFE MANNER.
Enquiry
Problem solving

4. UNDERTAKE SECURITY RISK ASSESSMENT FOR A SIMPLE IT SYSTEM AND PROPOSE


RESOLUTION ADVICE, BEING ABLE TO IDENTIFY, ANALYSE AND EVALUATE SECURITY
THREATS AND HAZARDS TO PLANNED AND INSTALLED INFORMATION SYSTEMS OR
SERVICES (E.G. CLOUD SERVICES).
Problem Solving
Communication

Module Learning Strategies

This course will have lectures (52 hours) and practical’s (52 hours). The lectures will be looking at the
academic aspects of networking and cyber security within commercial organisations. The underlying
theory will be given in these sessions and reinforced through the use of the practical’s. The intention
of this course is to give the student the skills needed to work on Cisco (or cyber security-based
equipment) based live equipment in a commercial setting and as such the tutorials are the chance to
work on the equipment and reinforce through experimentation what has been covered in the lectures.
The student will also be given optional access to the Cisco Academy learning material if they wish to
carry out extra study.

Module Special Admissions Requirements

None

Web Descriptor

This course is intended to equip you with not only the knowledge but also the practical skills to be able
to create and understand an enterprise grade network. The Syllabus incorporates the content of the
Cisco ICND1 qualification (Network fundamentals and routing/switching fundamentals). It also looks at
Cybersecurity which is a growing challenge, in which different stakeholders are involved ranging from
individuals up to organizations and governments. Effective information security requires participation,
planning, and practice. This part of the module is designed to teach you the essential concepts of
cybersecurity which are considered to be a gate for more advanced topics related to information
security.

Indicative Content

Networking topics -
This module will look at fundamental aspects of the technology which underlies an enterprise grade
network.

It introduces concepts around the OSI model, TCP/IP, network design and documentation, Ethernet
routing and switching, CLI and configuration, network Troubleshooting LAN switched networks and
campus architectures including VLAN's, Network Management and Access Control Lists, and
Wireless Networks based on 802.11.

The module will also look at IP addressing and associated techniques including DHCP and NAT/PAT.
Maintenance of network appliances and troubleshooting and the associated tools, for example Syslog
will be explored. It will also look at the WAN based routing which will allow for global communications.
The usage of these within the context of global remote working and linking different parts of the world
together for group work and communications will be investigated.

Cyber Security topics -


This part of the module is concerned with fundamentals of cyber security. The contents of this module
will focus on the essential concepts of cyber security.

You will be looking at:


IT security models
IT risk management
Cybersecurity principles applied to services, applications, servers, network devices (and devices in
general)
Legal, ethical issues in cyber security
Information security policy and scope
ISO27001 & ISO27002
Incident response management
Access control (basics)
Basic concepts of network security (e.g. firewall, IDS, )
Backup and recovery (basics)
Data and system attacks
How to identify vulnerabilities and put in place safeguards
Concepts of Confidentiality, Integrity and Availability

Reference Texts

Barker, L. (2016) CCENT 100-105 Exam Cram, Pearson IT Certification, ISBN-10:¿0789756730,


ISBN-13:¿978-0789756732
Campbell, A. (2016) Practical Information Security Management: A Complete Guide to Planning &
Implementation, 2016, Apress
Empson, S. (2016), CCNA Routing and Switching Portable Command Guide (ICND1 100-105, ICND2
200-105, and CCNA 200-125), Cisco Press, 4th Edt. ISBN-10:¿1587205882, ISBN-13:¿978-
1587205880
Franke, D,(2016) Cyber Security Basics, CreateSpace, ISBN: 9781522952190
Gollman, D. Computer Security, 2011, 3rd edition, Wiley, ISBN: 978-0470741153
Goodrich, M.T.,& R. Tamassia ,Introduction to Computer Security, 2013, Pearson, ISBN: 978-
1292025407
HM Government, The UK Cyber Security Strategy Protecting and promoting the UK in a digital world,
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-
security-strategy-final.pdf
International Organization for Standardization, ISO/IEC 27001:2013 - Information technology --
Security techniques -- Information security management systems -- Requirements". (Last reviewed
2019)
Johnson, T.A., Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare,
2015, ISBN-13: 978-1-48223923-2
Lammie, T. (2016) CCENT ICND1 study guide: Exam 100-105, Sybex, 3rd Edt. ISBN-10:
¿1119288789, ISBN-13:¿978-1119288787
Odom, W. (2016) CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition. Cisco Press.
ISBN-10:¿1587205807, ISBN-13:¿978-1587205804

Module Resources

Dedicated isolated Cyber lab with access to software and hardware systems

Access to Latest VM’s used to show and analyse cyber security issues and features

Specialist networking laboratories with Cisco equipment.

Access to specialist Security lab with multiple virtual machines and equipped with Windows and Linux.

For those students who wish to, access to the Cisco Academy portal where further material and
learning resources are available. The Academy access part of the course is entirely optional but is
highly recommended for working in the networking industry.

Additional Assessment Details

1. Group Assignment. This assignment will assess your practical skills of investigating and analysing
risks and secure processes within a full commercial based system. 2000- 3000 words

2. Group Assignment. You are to design a networked solution for a multi-site new start-up company
that is focused on e-sports. 2000- 3000 words

You might also like