Module overview
Aims and Objectives
Learning Outcomes
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- The cyber threat landscape, including actors
- Issues surrounding privacy and anonymity
- The importance of taking a multi-disciplinary approach to cyber security
- Network services, design, operation and security
- The Internet architecture and the layered TCP/IP networking model
- Approaches to making systems and networks more robust to attack
- Principles of networking protocols
Subject Specific Intellectual and Research Skills
Having successfully completed this module you will be able to:
- Assess network systems and technologies
- Design and analyse simple networks and the protocols they use
- Critically analyse a cyber attack and identify effective countermeasures
- Explain the fundamental concepts underlying computer networks
Syllabus
Learning and Teaching
Teaching and learning methods
| Type | Hours | 
|---|---|
| Revision | 16 | 
| Lecture | 36 | 
| Completion of assessment task | 5 | 
| Wider reading or practice | 60 | 
| Preparation for scheduled sessions | 5 | 
| Follow-up work | 18 | 
| Specialist Laboratory | 10 | 
| Total study time | 150 | 
Resources & Reading list
                                      Textbooks
                                
        
        
        
        
  
  
  
        
        
Andress, J. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress.
Clarke, R.A (2012). Cyber War: The Next Threat to National Security and What to Do about it. ECCO Press.
L. Parziale et al (2006). TCP/IP Tutorial and Technical Overview. IBM Redbooks.
A Tanenbaum, D. J. Wetherall (2010). Computer Networks. Pearson.
Graham, J., Howard, R. and Olson, R (2011). Cyber Security Essentials. CRC Press.
D. Comer and D. Stevens (1993). Internetworking with TCP/IP Volume III: Client-Server Programming and Applications. Prentice Hall.
Hadnagy, C. (2011). Social Engineering: The Art of Human Hacking. Wiley.
LL Peterson and BS Davie (2008). Computer Networks, a Systems Approach. Morgan Laufman.
Assessment
Assessment strategy
This module is assessed by a combination of coursework, assessed laboratories and a final assessment in the form of a computer aided examination.Summative
This is how we’ll formally assess what you have learned in this module.
| Method | Percentage contribution | 
|---|---|
| Laboratory Exercises | 30% | 
| Examination | 70% | 
Referral
This is how we’ll assess you if you don’t meet the criteria to pass this module.
| Method | Percentage contribution | 
|---|---|
| Examination | 100% | 
Repeat
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
| Method | Percentage contribution | 
|---|---|
| Examination | 100% |