Module Assessment Details
A case study exercise which will assess learning outcome 1-4 comp[rises of planning implementing and analysing a security audit (3500 words)
Module Indicative Content
Network Security course focusing on overall LAN security processes with particular emphasis on hands on skills in the following areas:-
Reconnaissance - Data gathering
TCP/IP
Network Scanning
Intrusion Detection
Network and Computer Attacks
Wireless Security
VoIP Attacks
Windows Hardening
Windows Vulnerabilities
Penetration Testing
This module incorporates elements of work-based learning.
Module Learning Strategies
Learning Strategies Module Launch (15 hours)
There will be a module launch during which 15 hours of face to face contact will be devoted to undertaking tasks which are designed to provide useful insights into the module content and purpose.
Guided Learning (11 hours)
A module tutor who is part of the teaching team of the module will be allocated to you and you will meet them during the launch. Following the launch, there will be some materials on the VLE which are designed to guide your learning. Additionally, there will be at least one hour per week of contact time for the eleven weeks following the launch. This will be used for learning guided led by your module tutor. It will be a face to face presentation if you are on day release. For online learners it will be flipped classroom approach with group (up to 20) seminars.
Reviews:
• Tutorial reviews for online learners (0.5 hour per student)
Online learners will have 2 tutorial sessions with their module tutor during the course of the module. These will be individual or small group sessions during which your module tutor will be able to answer any queries that you have regarding module work. The review weeks are listed in the module handbook and mentors will be invited to join the call and provide feedback.
• Tutorial sessions for day release learners (at least 0.5 hours per student)
There will scheduled tutorial sessions (up to 20 students) during the 11 weeks following the launch which will take the place of the tutorial reviews for day release students
Independent learning (123.5 hours)
The module leader will provide resources through the virtual learning environment which will include videos and presentations as well as links to useful websites. Other academic learning will be achieved through reading around the subject area. Module tutors will suggest useful texts, though many others will be suitable and can be found in our e-library. If you require help understanding any of the concepts, you may contact your module tutor for assistance.
Part of your independent learning will take place in your workplace under the guidance of your mentor. You will complete a work-based learning agreement to ensure that arrangements are in place at your workplace to facilitate this work-based learning. You are encouraged to endeavour to apply your growing academic knowledge to improve your work practice and to reflect on your work-based experiences to improve your learning.
You will be required to complete assignment work during independent learning time. Assignment work for a 15 credit module at level 5 should take around 60 hours to complete
Additional help with learning
You will have access to the departmental librarian. As a student, you are more than welcome to visit the university at any time and to use the resources. During time at the university, you may arrange to meet your module tutor or academic coach for additional help.
Module Resources
You will need access to these resources:
The VLE
An ICT Workplace environment. A Work-Based Learning Agreement will be completed for this module to ensure that the student will have access to the required resources in the workplace.
The Internet and office software
Staffordshire University has subscriptions to electronic book services such as Safari Tech Books, Ebrary and Netlibrary. There are titles in each of the collections that will support students studying this module.
Specialist networking equipment in labs or at work
Module Special Admissions Requirements
Prior study of Network Fundamentals
Module Learning Outcomes
1. DEMONSTRATE AN UNDERSTANDING OF SECURITY TERMINOLOGY, AND AN UNDERSTANDING OF SECURITY VULNERABILITIES
Knowledge & Understanding
Learning
2. DESIGN AND MANAGE A NETWORK PENETRATION TESTING PLAN
Application
Problem Solving
3. CONTRAST AND COMPARE SECURITY THREATS, TECHNOLOGIES, TOOLS AND SOLUTIONS
Analysis
Reflection
4. IMPLEMENT A NETWORK PENETRATION TESTING PLAN
Knowledge & Understanding
Learning
Module Texts
Network Security Essentials, Stallings, W., 2010, Pearson, ISBN: 978-0137067923