Module Descriptors
ETHICAL HACKING (BLENDED LEARNING)
COCS60723
Key Facts
Digital, Technology, Innovation and Business
Level 6
15 credits
Contact
Leader: Philip James
Hours of Study
Scheduled Learning and Teaching Activities: 26.5
Independent Study Hours: 123.5
Total Learning Hours: 150
Pattern of Delivery
  • Occurrence B, Stoke Campus, UG Semester 2
Sites
  • Stoke Campus
Assessment
  • Coursework - Assignment report 3000 words weighted at 100%
Module Details
Module Texts
Gollmann, D, Computer Security, 2010 John Wiley & Son ISBN: 0470741155

Stallings, W, Computer Security: Principles and Practices,2011 ISBN: 0132775069

Dulaney E, CompTIA Security+ Study Guide, John Wiley & Sons 2011 ISBN: 1118014731

Graves, K, Certified Ethical Hacker, John Wiley & Sons 2010 ISBN: 0470525207
Module Special Admissions Requirements
None
Module Resources
You will need access to these resources:

The VLE
An ICT Workplace environment. A Work-Based Learning Agreement will be completed for this module to ensure that the student will have access to the required resources in the workplace.

The Internet and office software
Staffordshire University has subscriptions to electronic book services such as Safari Tech Books, Ebrary and Netlibrary. There are titles in each of the collections that will support students studying this module.
Access to packet capturing software (wireshark, Packetyzer)
Virtual Environment (VMWare)
Module Learning Strategies
Students will have participated in an award induction workshop where they will learn how to use the Virtual Learning Environment (VLE) employed for the study of this module. Subsequently students will work through the module material provided on the VLE at a pace suggested within the VLE for the module. The material will include activities and review questions that allow students to assimilate the concepts and skills required by the module. Students will be encouraged to discuss relevant aspects within discussion forums that are part of the VLE. The forums will allow discussion with a student's peer group as well as the module tutor.
Google scholars, E-books, Research papers and journals will be used to support study on the module. Module Launch (15 hours)
There will be a module launch during which 10 hours of face to face contact will be devoted to undertaking tasks which are designed to provide useful insights into the module content and purpose.

Guided Learning (11 hours)
A module tutor who is part of the teaching team of the module will be allocated to you and you will meet them during the launch. Following the launch, there will be some materials on the VLE which are designed to guide your learning. Additionally, there will be at least one hour per week of contact time for the eleven weeks following the launch. This will be used for learning guided led by your module tutor. It will be a face to face presentation if you are on day release. For online learners it will be flipped classroom approach with group (up to 20) seminars.

Reviews:
• Tutorial reviews for online learners (0.5 hour per student)
Online learners will have 2 tutorial sessions with their module tutor during the course of the module. These will be individual or small group sessions during which your module tutor will be able to answer any queries that you have regarding module work. The review weeks are listed in the module handbook and mentors will be invited to join the call and provide feedback.

• Tutorial sessions for day release learners (at least 0.5 hours per student)
There will scheduled tutorial sessions (up to 20 students) during the 11 weeks following the launch which will take the place of the tutorial reviews for day release students

Independent learning (123.5 hours)
You will be required to work complete assignment work during independent learning time. Assignment work for a 15 credit module at level 6 should take around 70 hours to complete. However, you will need to learn about the subject in more detail before starting this.

Part of your independent learning will take place under the guidance of your workplace based mentor. You will complete a work-based learning agreement to ensure that arrangements are in place at your workplace to facilitate work-based learning. Learning in the workplace may take many forms but you are encouraged to apply academic knowledge to improve your work practice and to reflect on work based experiences to improve your learning.

Other academic learning will be achieved through reading around the subject area. Module tutors will suggest useful texts where possible but there will be many other suitable sources.


Additional help
All external students are more than welcome to visit the university at any time and to use the resources. During time at the university, they may arrange to meet the module tutor for additional help. Students have access to the departmental librarian

Module Assessment Details
An Assignment weighted at 100% (Learning outcomes, 1,2,3,4)
Report 3000 words detailing underpinning research, evaluation and implementation of secure systems and identification of weaknesses and vulnerability.
Module Indicative Content
Computer Security Concept, the Detection and Identification of Threats in diverse Systems. Operating System Protection Mechanisms, Security Architecture. Cryptographic Tools, User Authentication, Access control, Intrusion detection, Malicious software, Denial of Service, Firewalls and Intrusion prevention systems. Multilevel security and Trusted Computing. Physical and Infrastructure Security, Human Factors in Security, Security Auditing, Security Policies and Planning, Legal and Ethical issues, Business aspects of Penetration Testing, Technical Foundation of Hacking.
Module Learning Outcomes
1. EXPLAIN THE PRINCIPLES AND CONCEPTS INVOLVED IN SECURING NETWORKED AND STAND-ALONE SYSTEMS.
Knowledge & Understanding

2. CRITICALLY EVALUATE SECURITY TECHNIQUES USED TO PROTECT SYSTEMS AND USER DATA. Analysis
Problem solving

3. EVALUATE SECURITY IMPLEMENTATION IN A SYSTEM AND IDENTIFY CRITICAL POINTS OF FAILURE WHICH LEAD TO SYSTEM COMPROMISE.
Knowledge & Understanding
Problem solving

4. EXPLAIN AND JUSTIFY THE ETHICAL ISSUES RELATING TO THE PERFORMANCE OF PENETRATION TESTING.
Reflection