Module Descriptors
COMPUTER SECURITY ANALYSIS AND PENETRATION TESTING (BLENDED LEARNING)
COCS50737
Key Facts
Digital, Technology, Innovation and Business
Level 5
30 credits
Contact
Leader: Philip James
Hours of Study
Scheduled Learning and Teaching Activities: 53
Independent Study Hours: 247
Total Learning Hours: 300
Pattern of Delivery
  • Occurrence B, Stoke Campus, UG Semester 2
Sites
  • Stoke Campus
Assessment
  • Coursework - (3000 words report) weighted at 100%
Module Details
Module Texts
Peter Trim and Yang-Im Lee, Cyber Security Management: A Governance, Risk and Compliance Framework, Routledge; 1 edition, 2014

James S. Tiller, The Ethical Hack “A Framework for Business Value Penetration Testing”, AUERBACH PUBLICATIONS, 2005

Abhinav Singh, Metasploit Penetration Testing Cookbook, Packt Publishing Limited, 2012

Steve Manzuik, Network Security Assessment: from vulnerability to patch, 2007, Syngress William

Harris, S., Harper, A., Eagle, C. Ness, J., Gray Hat Hacking:The Ethical Hacker's handbook, 4th edition, McGraw-Hill, 2015

Rafay Baloch, Ethical Hacking and Penetration Testing Guide, CRC Press, 2015
Module Indicative Content
1. Understand the ethics and legal challenges of cyber security
2. Vulnerability identification and computer threats analysis and evaluation 3. Security Analysis Methodologies
4. Understand the business aspect behind penetration Testing
5. Analyse the technical foundation of penetration testing
6. Introduction to footprinting and scanning
7. System hacking and enumeration
8. Evaluation of automated security assessment tools
9. Report Writing and Post Test Actions
Additional topics may be covered, where possible and appropriate. We will use examples from Linux and other modern operating systems to illustrate concepts covered through the course.

Module Resources
You will need access to these resources:

The VLE
An ICT Workplace environment. Possibly suitable Networking equipment in the workplace. A Work-Based Learning Agreement will be completed for this module to ensure that the student will have access to the required resources in the workplace.
The Internet
Word Processing software for use in the coursework .
Staffordshire University has subscriptions to electronic book services such as Safari Tech Books, Ebrary and Netlibrary. There are titles in each of the collections that will support students studying this module. Staffordshire University has subscriptions to IEEExplore, ACM Digital Library, Elsevier Science Direct and Infotrac Computer Database all offering full text electronic access to journals and conference proceedings.
Module Special Admissions Requirements
Prior Study of Cyber Security Fundamentals
Module Learning Strategies
Module Launch (30 hours)
There will be a module launch during which 20 hours of face to face contact will be devoted to undertaking tasks which are designed to provide useful insights into the module content and purpose.

Guided Learning (22 hours)
A module tutor who is part of the teaching team of the module will be allocated to you and you will meet them during the launch. Following the launch, there will be some materials on the VLE which are designed to guide your learning. Additionally, there will be at least two hour long sessions per week of contact time for the eleven weeks following the launch. This will be used for learning guided led by your module tutor. It will be a face to face presentation if you are on day release. For online learners it will be flipped classroom approach with group (up to 20) seminars.

Reviews:
• Tutorial reviews for online learners (1 hour per student)
Online learners will have 2 tutorial sessions with their module tutor during the course of the module. These will be individual or small group sessions during which your module tutor will be able to answer any queries that you have regarding module work. The review weeks are listed in the module handbook and mentors will be invited to join the call and provide feedback.

• Tutorial sessions for day release learners (at least 1 hour per student)
There will scheduled tutorial sessions (up to 20 students) during the 11 weeks following the launch which will take the place of the tutorial reviews for day release students

Independent learning (247 hours)
The module leader will provide resources through the virtual learning environment which will include videos and presentations as well as links to useful websites. Other academic learning will be achieved through reading around the subject area. Module tutors will suggest useful texts, though many others will be suitable and can be found in our e-library. If you require help understanding any of the concepts, you may contact your module tutor for assistance.

Part of your independent learning will take place in your workplace under the guidance of your mentor. You will complete a work-based learning agreement to ensure that arrangements are in place at your workplace to facilitate this work-based learning. You are encouraged to endeavour to apply your growing academic knowledge to improve your work practice and to reflect on your work-based experiences to improve your learning.

You will be required to complete assignment work during independent learning time. Assignment work for a 30 credit module at level 5 should take around 120 hours to complete

Additional help with learning
You will have access to the departmental librarian. As a student, you are more than welcome to visit the university at any time and to use the resources. During time at the university, you may arrange to meet your module tutor or academic coach for additional help
Module Learning Outcomes
1. EXPLAIN AND JUSTIFY THE ETHICAL ISSUES RELATING TO THE PERFORMANCE OF PENETRATION TESTING
Knowledge & Understanding

2. PERFORM SECURITY RISK ASSESSMENTS FOR A RANGE OF INFORMATION SYSTEMS AND PROPOSE SOLUTIONS
Application
Enquiry
Knowledge & Understanding
Problem Solving

3- DEMONSTRATE A CRITICAL KNOWLEDGE OF THE MAIN TOOLS, METHODS AND PROCEDURES USED WITHIN NETWORK SECURITY
Knowledge & Understanding

4- COMMUNICATE EFFECTIVELY THE RESULTS OF PENETRATION TESTING
Communication

5- Conduct a range of cyber security audit activities to demonstrate security control effectiveness Knowledge & Understanding
analysis


Module Additonal Assessment Details
Learning Outcomes 1-5

Coursework consists of:
Assignment 1. 50 %

Assignment 2. 50%