Anda di halaman 1dari 3

Asia Pacific University of Technology and Innovation

1. Name of Course/Module: Network Security


Version : 0416
2. Course Code: CT037-3-2
3. Total Student Face to Face Total Guided and Independent Learning
Learning Time
(SLT)
L = Lecture L T P O 120
T = Tutorial 14 28
P = Practical
O= Others
4. Credit Value: 3

5. Prerequisite (if any): Introduction to Networking (CT043-3-1) or equivalent

6.
Objectives
1. Contribute to the achievement of the Learning Outcomes specified for the
student’s award at Level 2
2. Enable students to develop their knowledge and skills in relation to Network
Security
3. Develop the ability of students to apply the knowledge they gain in relation to the
study of Network Security
4. Further develop lifelong learning skills of independent learning and study in relation
to Network Security
5. Enable students to develop their ability to:
• Communicate in varied situations
• Use ICT relevant to given situations
• Be aware of the needs of others and self

Network Security CT037-3-2 Page 1 of 3


Asia Pacific University of Technology and Innovation

7. Learning outcomes:

On successful completion of this module, you should be able to:

1. Analyze the interactions of the components and protocols that form a computer
network.(MQF4)
2. Demonstrate an understanding of security terminology, secure network design
concepts and a detailed understanding of security vulnerabilities. (MQF1,
MQF2)
3. Identify potential threats that may lose or obscure stored data. (MQF3)
4. Evaluate the standards used to define computer networks and the threats and
risks presented to a computing system in a given realistic scenario. (MQF3,
MQF4)
5. Compare and contrast security technologies, products, solutions and designs.
(MQF6)
6. Design, implement and manage network security equipment’s. (MQF7, MQF8)

MQF Learning Outcome Area


MQF 1 - Knowledge
MQF 2 - Practical skills
MQF 3 - Social skills & responsibilities
MQF 4 - Values, attitudes, professionalism and ethics
MQF 5 - Communications, leadership and team skills
MQF 6 - Problem solving & scientific skills
MQF 7 - Information management and lifelong learning skills
MQF 8 - Managerial & entrepreneurial skills

8. Transferable Skills:

The following employability skills are introduced (I), developed (D) and/or assessed
(A):
Critical thinking & analysis (I, D, A),Effective problem solving (I &D), Creativity &
innovation (I, D), Communication (I,D), ICT skills (I,D), Self-management (I &D),
Learning (I &D), Team working (I &D).
9. Teaching-learning and assessment strategy:

The module comprises lectures and practical and involves team working skills within
the assignment.
10. Synopsis:

This module will introduce and explore issues and concepts involved in the security of
networks and consider the day to day requirements of keeping them functional and
safe. It will allow introduce students to consideration of the security needs of an
organization and study some of the popular countermeasures used to deter malicious
attacks upon networks. In addition, it introduces the students to the security in Routers,
Networking devices and appliances, such as Firewalls, VPNs, and IDSs.
11. Mode of Delivery:

Lecture and Practical


12. Assessment Methods and Types

• Group In-course assignment weighted at 100% with 60% of the total


contributed by an individual components (LOs 1 - 6)

Network Security CT037-3-2 Page 2 of 3


Asia Pacific University of Technology and Innovation

13. • Main references supporting the course

Essential Reading

Bob Vachon, CCNA Security 210 – 260, , Cisco Press (2016), ISBN-13:978-1-58720-
575-0 ISBN-10: 1-58720-575-0
Thomas J. Mowbray (2013) Cybersecurity: Managing Systems, Conducting Testing,
and Investigating Intrusions Wiley; ISBN: 1118697111
EMC (2012), Information Storage and Management: Storing, Managing, and Protecting
Digital Information. Wiley.
Further Reading
Stallings, W (2013), Cryptography and Network Security: Principles and Practice. 6th
ed. Prentice Hall. ISBN: 0133354695
Stallings, W (2011), Computer Security: Principles and Practice. 2nd ed. Prentice Hall.
Weaver, R (2008), Guide to Tactical Perimeter Defense. Thomson

14. Other additional information:

• CISCO Local Academies only


• On-line learning material provided by CISCO Inc.
• CISCO Networking Academy programme assessment server
• Laboratory exercise sheets provided by course instructor

Network Security CT037-3-2 Page 3 of 3

Anda mungkin juga menyukai