Module Descriptors
OPERATIONS IN THE CYBER DOMAIN: ETHICAL HACKING 1 (DISTANCE LEARNING)
COCS60532
Key Facts
Digital, Technology, Innovation and Business
Level 6
15 credits
Contact
Leader: Tomasz Bosakowski
Hours of Study
Scheduled Learning and Teaching Activities: 3
Independent Study Hours: 147
Total Learning Hours: 150
Pattern of Delivery
  • Occurrence B, Stoke Campus, UG Semester 3 to UG Semester 1
  • Occurrence B, Stoke Campus, UG Semester 3
  • Occurrence D, Stoke Campus, UG Semester 2
  • Occurrence E, RAF - Cosford, UG Semester 2
Sites
  • RAF - Cosford
  • Stoke Campus
Assessment
  • ASSIGNMENT weighted at 100%
Module Details
Module Indicative Content
Computer Security Concept, the Detection and Identification of Threats in diverse Systems. Operating System Protection Mechanisms, Security Architecture. Cryptographic Tools, User Authentication, Access control, Intrusion detection, Malicious software, Denial of Service, Firewalls and Intrusion prevention systems. Multilevel security and Trusted Computing. Physical and Infrastructure Security, Human Factors in Security, Security Auditing, Security Policies and Planning, Legal and Ethical issues, Business aspects of Penetration Testing, Technical Foundation of Hacking.
Module Additional Assessment Details
An Assignment weighted at 100% (Learning outcomes, 1,2,3,4)
Report 3000 words detailing underpinning research, evaluation and implementation of secure systems and identification of weaknesses and vulnerability.
Module Learning Strategies
Students will have participated in an award induction workshop where they will learn how to use the Virtual Learning Environment (VLE) employed for the study of this module. Subsequently students will work through the module material provided on the VLE at a pace suggested within the VLE for the module. The material will include activities and review questions that allow students to assimilate the concepts and skills required by the module. Students will be encouraged to discuss relevant aspects within discussion forums that are part of the VLE. The forums will allow discussion with a student's peer group as well as the module tutor.
Google scholars, E-books, Research papers and journals will be used to support study on the module.
Module Special Admissions Requirements
Must be enrolled on BSc (Hons) Intelligence and Security (Top-up)
Module Resources
Access to packet capturing software (wireshark, Packetyzer)
Virtual Environment (VMWare)
Module Texts
Gollmann, D, Computer Security, 2010 John Wiley & Son ISBN: 0470741155
Stallings, W, Computer Security: Principles and Practices,2011 ISBN: 0132775069
Dulaney E, CompTIA Security+ Study Guide, John Wiley & Sons 2011 ISBN: 1118014731
Graves, K, Certified Ethical Hacker, John Wiley & Sons 2010 ISBN: 0470525207