Anda di halaman 1dari 4

Asia Pacific Institute of Information Technology

1. Name of Course/Module Security Technologies


2. Course Code: CE00398-4
3. Name(s) of academic staff: Yogeswaran Nathan
4. Rationale for the inclusion of the course/module in the programme:
Refer to Programme Specification
5. Semester and Year offered: Refer to Programme Specification
6. Total Student Face to Face Total Guided and Independent Learning
Learning Time
(SLT)
L = Lecture L T P O
T = Tutorial 32 16 160
P = Practical
O= Others
7. Credit Value: 4
8. Prerequisite (if any): Nil
9. Objectives

The objectives of this module is to:


1. Contribute to the achievement of the Learning Outcomes specified for the student’s award
at Level 4.
2. Develop knowledge and skills in relation to Computer Security.
3. Develop an understanding of the history of security technologies, system intrusion
techniques, system vulnerability assessment, methods of system exploitation, system
intrusion detection and prevention.
4. Develop lifelong learning skills of independent learning and study in relation to Computer
Security.

10. Learning outcomes:

On successful completion of this module, you should be able to:

1. Identify and describe aspects of historical and current systems associated with
security. (MQF1, MQF7)
2. Relate typical security techniques to typical scenarios. (MQF1,MQF6,MQF7)
3. Identify and describe current technology trends relating to security techniques and
technology.(MQF1, MQF7)

MQF Learning Outcome Area


MQF1 - Knowledge
MQF2 - Practical skills
MQF3 - Social skills & responsibilities
MQF4 - Values, attitudes, professionalism and ethics
MQF5 - Communications, leadership and team skills
MQF6 - Problem solving & scientific skills
MQF7 - Information management and lifelong learning skills
MQF8 - Managerial & entrepreneurial skills

Security Technologies– CE00398-4 Page 1of 4


Asia Pacific Institute of Information Technology

11. Transferable Skills:

The following employability skills are introduced (I), developed (D) and/or assessed (A):
 Time Management(I,D)
 Problem solving(I,D,A)
 Knowledge & Understanding (I)
 Application (I,D,A)
 Analytical Skills (I,D, A)

12. Teaching-learning and assessment strategy:

2 hours lecture and 1 hour practical per week


In addition the student will be required to undertake an amount of independent learning for
the production of the module assignment together with other background reading to support
lecture and tutorial material.

13. Synopsis:
An introduction to a range of techniques associated with computer security. The module will
consider the different aspects separately and combined to aid with the reduction of
unauthorised access and usage together with techniques to detect intrusions.

14. Mode of Delivery:

Lecture and Practical

15. Assessment Methods and Types

A COURSEWORK weighted at 70%. A CLASS TEST weighted at 30%.

A class test weighted at 30% (learning outcomes 1-3)


A coursework weighted at 70% (learning outcomes 1-3)

16. Mapping of the course/module to the Programme Aims :


Refer to the Programme Specification
17. Mapping of the course/module to the Programme Learning Outcomes:
Refer to the Programme Specification
18. Content outline of the course/module and the SLT per topic:

Week Topics L T P O Ind


Introduction
 Overview of the Module
 General Guidelines & Learning Approach
 Assessments Briefing
1  Introduction to the Subject Area 2 1 7
o History and Overview of Security
o Users, Systems and Data
o The Information Security Cycle
o Security Threats

Security Technologies– CE00398-4 Page 2of 4


Asia Pacific Institute of Information Technology

Security Concepts, Models and Protocols


 CIA – Confidentiality, Integrity and Availability
 AAA – Authentication, Authorization and
2 2 1 7
Accounting

Security Operations: Essential Functions


 Physical Security: Structural, Electronic and
Human Protection Systems
 Personnel Security: Management, Leadership
and Ethics
3  Information Security: Information Protection 2 1 7
Strategies, Communications Security, Computer
Security
 Network Security
 Manage Data Security
Network Security Threats
 Terminology and Background
2 1 7
 Understand network attack techniques
4
 Identify network attack detection problems
 Use network scanning tools
Risk Management
 Risk Analysis
 Implement Vulnerability Assessment Tools and 2 1 7
5
Techniques
 Scan for Vulnerabilities
 Mitigate and Deterrent Techniques
Managing Certificates
 Install a CA Hierarchy
 Enroll Certificates 2 1 7
6
 Secure Network Traffic by Using Certificates
 Renew,Backup,Restore and Revokes
Certificates
Fundamental of Firewall
 Types of Firewall
 Pros and Cons of Firewalls 4 2 14
7-8  Rules and packet filters
 Proxy
 Honey pot
Wireless Network Security
 Understand the components of a wireless
network
4 2 14
 Understand wireless technologies
9-10
 Detect wireless network
 Secure wireless communication
 Developing a wireless policy

Implement Compliance and Operational Security


 Physical Security
4 2 14
11-12  Legal Compliance
 Security Awareness and Training
 Integrate System and Data with Third Parties

Security Technologies– CE00398-4 Page 3of 4


Asia Pacific Institute of Information Technology

Troubleshooting and Managing Security Incidents


13  Respond to Security Incidents
 Recover from a Security Incident 2 1 7
Business Continuity and Disaster Recovery
Planning
14-15  Business Continuity 4 2 14
 Plan for Disaster Recovery
 Execute DRPs and Procedure
Summary
 Summary of Module
 Revision of Major Topic Areas
16 2 1 7
 Assessment Discussion
 Presentation

TOTAL 32 16 112
19.
Essential Reading

 Darril Gibson (2017) Comptia Security + (4th edition), YCDA LLC Press, ISBN 978-
1939136053
 Charles J. Brooks, Philip Craig (2018), Cybersecurity Essentials 1st Edition, Sybex
ISBN 978-1119362395

20. Other additional information:

None

Security Technologies– CE00398-4 Page 4of 4

Anda mungkin juga menyukai