COMP08138 2018 Cyber Security
This module is aimed at providing the knowledge and skills required to proactively detect and mitigate network security threats by leveraging features that exist in Cisco and other industry network security products today. Designed for professional security analysts, the course covers essential areas of competency, including event monitoring, security event/alarm/traffic analysis, and incident response.
Learning Outcomes
On completion of this module the learner will/should be able to;
Analyse Network and security concepts
Compare and contrast symmetric and asymmetric encryption algorithms
Interpret the functionality of theendpoint technologies in regards to security monitoring
Evaluate, mitigate and contrast an attack surface and vulnerability
Teaching and Learning Strategies
Classoom instruction and practical laboratory sessions
Module Assessment Strategies
Written and practical CA followed by a closed book two hour written final exam at the end of the semester.
Repeat Assessments
A two month project will be set in this case.
Module Dependencies
Indicative Syllabus
Function of the network layers as specified by the OSI and the TCP/IP network modelsDescribe the operation of the following
The functions of these network security systems as deployed on the host, network,
The relationship between VLANs and data visibility
Operation of ACLs applied as packet filters on the interfaces of network devices
Compare and contrast deep packet inspection with packet filtering and stateful firewall operation
Vulnerability management
Cryptography
Tthe security impact of these commonly used encryption algorithms and secure
Functionality of these endpoint technologies in regards to security monitoring
Identify the types of data provided by these technologies
Types of data used in security monitoring
NextGen IPS event types
The function of these protocols in the context of security monitoring
Compare and contrast an attack surface and vulnerability
Social engineering
Compare and contrast remote exploit and a local exploit
Coursework & Assessment Breakdown
Coursework Assessment
Title | Type | Form | Percent | Week | Learning Outcomes Assessed | |
---|---|---|---|---|---|---|
1 | CA | Coursework Assessment | Closed Book Exam | 20 % | Week 6 | 1,2 |
2 | CA | Coursework Assessment | Practical Evaluation | 20 % | Week 14 | 1,2,3,4 |
3 | CA | Coursework Assessment | Written Report/Essay | 10 % | OnGoing | 1,2,3,4 |
End of Semester / Year Assessment
Title | Type | Form | Percent | Week | Learning Outcomes Assessed | |
---|---|---|---|---|---|---|
1 | Exam | Final Exam | Closed Book Exam | 50 % | End of Semester | 1,2,3,4 |
Full Time Mode Workload
Type | Location | Description | Hours | Frequency | Avg Workload |
---|---|---|---|---|---|
Lecture | Computer Laboratory | Lecture | 1 | Weekly | 1.00 |
Practical / Laboratory | Computer Laboratory | Laboratory | 2 | Weekly | 2.00 |
Independent Learning | Not Specified | Independent Learning | 4 | Weekly | 4.00 |
Online Learning Mode Workload
Type | Location | Description | Hours | Frequency | Avg Workload |
---|---|---|---|---|---|
Online Lecture | Distance Learning Suite | Lecture | 1.5 | Weekly | 1.50 |
Directed Learning | Not Specified | Directed Learning | 1.12 | Weekly | 1.12 |
Independent Learning | Not Specified | Independent Learning | 4.5 | Weekly | 4.50 |
Required & Recommended Book List
2017 Cyber Security and IT Infrastructure Protection Syngress
This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Module Resources
---
---
---
---