6.
Objectives
1. Contribute to the achievement of the Learning Outcomes specified for the
student’s award at Level 2
2. Enable students to develop their knowledge and skills in relation to Network
Security
3. Develop the ability of students to apply the knowledge they gain in relation to the
study of Network Security
4. Further develop lifelong learning skills of independent learning and study in relation
to Network Security
5. Enable students to develop their ability to:
• Communicate in varied situations
• Use ICT relevant to given situations
• Be aware of the needs of others and self
7. Learning outcomes:
1. Analyze the interactions of the components and protocols that form a computer
network.(MQF4)
2. Demonstrate an understanding of security terminology, secure network design
concepts and a detailed understanding of security vulnerabilities. (MQF1,
MQF2)
3. Identify potential threats that may lose or obscure stored data. (MQF3)
4. Evaluate the standards used to define computer networks and the threats and
risks presented to a computing system in a given realistic scenario. (MQF3,
MQF4)
5. Compare and contrast security technologies, products, solutions and designs.
(MQF6)
6. Design, implement and manage network security equipment’s. (MQF7, MQF8)
8. Transferable Skills:
The following employability skills are introduced (I), developed (D) and/or assessed
(A):
Critical thinking & analysis (I, D, A),Effective problem solving (I &D), Creativity &
innovation (I, D), Communication (I,D), ICT skills (I,D), Self-management (I &D),
Learning (I &D), Team working (I &D).
9. Teaching-learning and assessment strategy:
The module comprises lectures and practical and involves team working skills within
the assignment.
10. Synopsis:
This module will introduce and explore issues and concepts involved in the security of
networks and consider the day to day requirements of keeping them functional and
safe. It will allow introduce students to consideration of the security needs of an
organization and study some of the popular countermeasures used to deter malicious
attacks upon networks. In addition, it introduces the students to the security in Routers,
Networking devices and appliances, such as Firewalls, VPNs, and IDSs.
11. Mode of Delivery:
Essential Reading
Bob Vachon, CCNA Security 210 – 260, , Cisco Press (2016), ISBN-13:978-1-58720-
575-0 ISBN-10: 1-58720-575-0
Thomas J. Mowbray (2013) Cybersecurity: Managing Systems, Conducting Testing,
and Investigating Intrusions Wiley; ISBN: 1118697111
EMC (2012), Information Storage and Management: Storing, Managing, and Protecting
Digital Information. Wiley.
Further Reading
Stallings, W (2013), Cryptography and Network Security: Principles and Practice. 6th
ed. Prentice Hall. ISBN: 0133354695
Stallings, W (2011), Computer Security: Principles and Practice. 2nd ed. Prentice Hall.
Weaver, R (2008), Guide to Tactical Perimeter Defense. Thomson