WM282-15 Secure Networks
Introductory description
In today's digitally connected world, where vast amounts of information are exchanged over networks, ensuring the security and protection of data has become paramount. Network security plays a crucial role in safeguarding the integrity, confidentiality, and availability of information transmitted across computer networks. It encompasses a set of measures, technologies, and best practices designed to prevent unauthorized access, mitigate threats, and maintain the overall security posture of networked systems. As organizations rely heavily on networks to carry out their operations, any compromise in network security can have severe consequences. Breaches in network security can lead to data theft, financial loss, reputational damage, and legal liabilities. Consequently, businesses and individuals alike must prioritize the implementation of robust network security measures to protect sensitive information, maintain customer trust, and ensure business continuity. The module covers basic concepts of cyber security, such as confidentiality, integrity, availability, authentication, and authorization. These concepts will be explored within the context of several generic asset configurations, enabling students to understand the potential threats that may arise and various security measures that will be used to defend against these threats.
Module aims
This module aims to equip students with a comprehensive understanding and practical experience of network security, threats and mechanisms that have been developed to counter them using various network security tools, and techniques in a legal and ethical manner.
Outline syllabus
This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.
The content of this module will be taught from a cyber security perspective.
- Network security threats
- Security techniques and controls; CIA principles
- Operations, physical and environmental security
- Network infrastructure and devices
- Security architecture and design
- Authentication, authorisation and auditing
- Firewalls and, intrusion detection and prevention
- Types and methods of attack and defence.
Learning outcomes
By the end of the module, students should be able to:
- Demonstrate advanced understanding and practical knowledge of the fundamental principles and concepts of network security.
- Apply network security tools and techniques to systematically design, evaluate and troubleshoot a secure network.
- Design and implement tailored security measures that align with the specific requirements of a given network.
- Evaluate the effectiveness of cyber tools and techniques in identifying and analysing network attacks in diverse organisational contexts.
Indicative reading list
Sarhan M, Musa, " Network Security and Cryptography: A Self-teaching Introduction", Mercury Learning and Information (2018), ISBN: 978-1942270836
Stallings, William, “Cryptography and Network Security: Principles and Practice”, Pearson (2014), ISBN: 9780273793359.
Bejtlich, Richard, “The Practice of Network Security Monitoring; understanding incident detection and response”, No Starch Press (2013), ISBN: 9781593275341
Stallings, William, “Network Security Essentials: Applications and Standards”, Pearson (2016), ISBN: 9780134527338
Subject specific skills
Network troubleshooting
Implementation of tailored network security solutions
Network vulnerability assessment
Transferable skills
Problem solving
Analytical Skills
Critical thinking
Study time
Type | Required |
---|---|
Supervised practical classes | 18 sessions of 2 hours (24%) |
Private study | 54 hours (36%) |
Assessment | 60 hours (40%) |
Total | 150 hours |
Private study description
Independent activity between workshops
Costs
No further costs have been identified for this module.
You must pass all assessment components to pass the module.
Assessment group A
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Assessment component |
|||
Coursework | 50% | 30 hours | Yes (extension) |
Students will prepare a written report to evaluate and troubleshoot a secure network of a given case study. |
|||
Reassessment component is the same |
|||
Assessment component |
|||
Coursework | 50% | 30 hours | Yes (extension) |
Students will prepare a written report to design a secure network that aligns with the specific requirements of a given network as well as utilize security tools to identify and analyse potential network attacks in the given scenario. |
|||
Reassessment component is the same |
Feedback on assessment
Feedback given as appropriate to the assessment type:
- verbal feedback given during seminar/tutorial sessions,
- written individual formative feedback on the assignment report and on the presentation,
- written cohort-level summative feedback on the exam.
Courses
This module is Core for:
-
UWMA-H651 Undergraduate Cyber Security
- Year 2 of H651 Cyber Security
- Year 2 of H651 Cyber Security
- Year 2 of H651 Cyber Security