COMP08138 2018 Cyber Security

General Details

Full Title
Cyber Security
Transcript Title
Cyber Security
Code
COMP08138
Attendance
N/A %
Subject Area
COMP - Computing
Department
COEL - Computing & Electronic Eng
Level
08 - NFQ Level 8
Credit
05 - 05 Credits
Duration
Semester
Fee
Start Term
2018 - Full Academic Year 2018-19
End Term
9999 - The End of Time
Author(s)
Fiona Mitchell, Paul Flynn
Programme Membership
SG_KNCLD_H08 201800 Bachelor of Science (Honours) in Computing in Computer Networks and Cloud Infrastructure SG_KCMPU_H08 201800 Bachelor of Science (Honours) in Computing SG_KNCLD_K08 201800 Level 8 Honours Degree Add-on in Computing in Computer Networks and Cloud Infrastructure SG_KCNCI_K08 201800 Bachelor of Science (Honours) in Computing in Computer Networks and Cloud Infrastructure SG_KNCLD_E08 201800 Certificate in Computing in Computer Networks and Cloud Infrastructure SG_KNCLD_E08 201900 Certificate in Computing in Computer Networks and Cloud Infrastructure SG_KCMPU_H08 201900 Bachelor of Science (Honours) in Computing SG_KNCLD_H08 201900 Bachelor of Science (Honours) in Computing in Computer Networks and Cloud Infrastructure SG_KCNCI_K08 201900 Bachelor of Science (Honours) in Computing in Computer Networks and Cloud Infrastructure SG_KNCLD_K08 201900 Level 8 Honours Degree Add-on in Computing in Computer Networks and Cloud Infrastructure SG_KNCLD_H08 202000 Bachelor of Science (Honours) in Computing in Computer Networks and Cloud Infrastructure SG_KNCLD_K08 202000 Bachelor of Science (Honours) in Computing in Computer Networks and Cloud Infrastructure (Add-on) SG_KCNCI_K08 202000 Bachelor of Science (Honours) in Computing in Computer Networks and Cloud Infrastructure (Add-on) SG_KNCLD_E08 202000 Certificate in Computing in Computer Networks and Cloud Infrastructure SG_KCMPU_H08 202000 Bachelor of Science (Honours) in Computing SG_KCNCS_H08 202100 Bachelor of Science (Honours) in Computing in Computer Networks and Cyber Security SG_KCMPU_H08 202100 Bachelor of Science (Honours) in Computing SG_KCMPU_H08 202200 Bachelor of Science (Honours) in Computing
Description

This module is aimed at providing the knowledge and skills required to proactively detect and mitigate network security threats by leveraging features that exist in Cisco and other industry network security products today. Designed for professional security analysts, the course covers essential areas of competency, including event monitoring, security event/alarm/traffic analysis, and incident response.

 

Learning Outcomes

On completion of this module the learner will/should be able to;

1.

Analyse Network and security concepts

2.

Compare and contrast symmetric and asymmetric encryption algorithms

3.

Interpret the functionality of theendpoint technologies in regards to security monitoring

4.

Evaluate, mitigate and contrast an attack surface and vulnerability

Teaching and Learning Strategies

Classoom instruction and practical laboratory sessions

Module Assessment Strategies

Written and practical CA followed by a closed book two hour written final exam at the end of the semester.

Repeat Assessments

A two month project will be set in this case.

Module Dependencies

Prerequisites
COMP07167 201800 Network Security (CCNA Security)

Indicative Syllabus

Function of the network layers as specified by the OSI and the TCP/IP network modelsDescribe the operation of the following
The functions of these network security systems as deployed on the host, network,
The relationship between VLANs and data visibility
Operation of ACLs applied as packet filters on the interfaces of network devices
Compare and contrast deep packet inspection with packet filtering and stateful firewall operation
Vulnerability management
Cryptography
Tthe security impact of these commonly used encryption algorithms and secure
Functionality of these endpoint technologies in regards to security monitoring
Identify the types of data provided by these technologies
Types of data used in security monitoring
NextGen IPS event types
The function of these protocols in the context of security monitoring
Compare and contrast an attack surface and vulnerability
Social engineering
Compare and contrast remote exploit and a local exploit

Coursework & Assessment Breakdown

End of Semester / Year Formal Exam
100 %

Coursework Assessment

Title Type Form Percent Week Learning Outcomes Assessed
1 CA Coursework Assessment Closed Book Exam 20 % Week 6 1,2
2 CA Coursework Assessment Practical Evaluation 20 % Week 14 1,2,3,4
3 CA Coursework Assessment Written Report/Essay 10 % OnGoing 1,2,3,4

End of Semester / Year Assessment

Title Type Form Percent Week Learning Outcomes Assessed
1 Exam Final Exam Closed Book Exam 50 % End of Semester 1,2,3,4
             
             

Full Time Mode Workload


Type Location Description Hours Frequency Avg Workload
Lecture Computer Laboratory Lecture 1 Weekly 1.00
Practical / Laboratory Computer Laboratory Laboratory 2 Weekly 2.00
Independent Learning Not Specified Independent Learning 4 Weekly 4.00
Total Full Time Average Weekly Learner Contact Time 3.00 Hours

Online Learning Mode Workload


Type Location Description Hours Frequency Avg Workload
Online Lecture Distance Learning Suite Lecture 1.5 Weekly 1.50
Directed Learning Not Specified Directed Learning 1.12 Weekly 1.12
Independent Learning Not Specified Independent Learning 4.5 Weekly 4.50
Total Online Learning Average Weekly Learner Contact Time 2.62 Hours

Required & Recommended Book List

Recommended Reading
2017 Cyber Security and IT Infrastructure Protection Syngress

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.

Module Resources

Journal Resources

---

URL Resources

---

Other Resources

---

Additional Information

---