Module Descriptors
ROUTER SECURITY TECHNOLOGIES (BLENDED LEARNING)
COCS50230
Key Facts
Digital, Technology, Innovation and Business
Level 5
15 credits
Contact
Leader: Justin Champion
Hours of Study
Scheduled Learning and Teaching Activities: 6
Independent Study Hours: 144
Total Learning Hours: 150
Assessment
  • REPORT weighted at 75%
  • ASSIGNMENT - PRACTICAL weighted at 25%
Module Details
Module Additional Assessment Details
A report (3000 words) weighted at 75% (Learning outcome 1)
Practical assessment (1 hour) closed book - weighted at 25% Learniing Outcomes 2 and 3.
Module Resources
CISCO Local Academies only
On-line learning material provided by CISCO Inc.
CISCO Networking Academy programme assessment server
Laboratory exercise sheets provided by course instructor

NOTE
Instructors teaching this module who use the CISCO material must have completed CCNA 1, 2, 3 and 4, INS1&2, ISCW or IINS
Module Texts
CCNA Security Official Exam Certification Guide (Exam 640-553), Watkisn and Wallace, Cisco Press, Illustrated Edition (3 July 2008), ISBN-13:9781587202209
Module Special Admissions Requirements
Prior study of CE02013-1 Introduction to Networking with LAN's and WAN's (Blended Learning) and CE02004-2 LAN Switching and WAN Networks (Blended Learning) OR have passed CCNA 1, 2, 3 and 4
Only available for students on FCET Negotiated Undergradute awards
Module Learning Strategies
Self-directed learning using on-line material
These learning strategies will occupy your time:
6 hours classroom teaching including presentations and seminar sessions which will include individual and group activities, On-line multiple choice tests to give formative feedback and team assignment work as part of lab work and skills test
The classroom teaching will include a broad overview of the indicative content.
Lab sessions every week to gain practical networking experience andreinforce theory
Investigation using Web
Module Indicative Content
The module looks at types of threat, securing access access to devices, AAA, implementing firewall and intrusion protection technologies, layer 2 security features, cryptographic systems, VPN's and how to manage a secure network