INDICATIVE CONTENT
Communications
Communications in a Connected World
Online Connections
Building Simple Networks
Communication Principles
Network Design and the Access Layer
Routing Between Networks
The Internet Protocol: IPv4 and IPv6 Addressing
Transport Layer Services
Application Layer Services
Building Home Networks
Security Considerations
Configuring Networks and Device Security
Configuring Switches and Routers via the command line
Building Small Organisation Networks
Troubleshooting Common Network Problems
Cyber Security
Explaining the need for and importance of cybersecurity
Explaining the characteristics and value of personal data, and data within an organization
Attacks, Concepts and Techniques
Recognize the characteristics and operation of a cyber-attack
Interpret the trends in the cyber threat landscape
Protecting Data and Privacy
Understand how to protect devices from threats
Safeguarding and privacy
Protecting an organization
Techniques to protect organizations from cyber-attacks
Recognize the behaviour-based approach to cybersecurity
Cisco’s approach to cybersecurity
Future Cybersecurity
Legal and ethical issues in cybersecurity
Opportunities for pursuing an education and a career in cybersecurity
ADDITIONAL ASSESSMENT DETAILS
Class-test - The practical class-test will test the skills gained from the practical sessions of the module and will assess knowledge and understanding gained in this area. This will culminate with doing a set of practical network administration tasks on a variety of devices in order to configure them for a cohesive network (Learning Outcome 2).
Multiple Choice Question Class-test - The MCQ Class Test will assess a student's knowledge and learning in the indicative content below, primarily focusing on the theory behind the module and reflecting on presented scenarios (Learning Outcomes 1,3, and 4).
LEARNING OUTCOMES
1. Be able to describe the use of protocols in a networked environment
Knowledge and Understanding
Learning
2. Be able to design and create small scale networks utilising switching, routing and wireless technologies
Enquiry
Problem solving
3. Be able to identify the need for cybersecurity and defined attacks, concepts and techniques
Knowledge and Understanding
Learning
4. Develop understanding of the need to protect data/privacy and an organisations infrastructure
Understanding
Problem Solving
LEARNING STRATEGIES
All teaching sessions will blend theory and practical learning. Students will be introduced to curriculum concepts and ideas and will then be able to apply theory to practical examples within the same sessions. In addition, students will be provided with a range of resources for independent study such as case studies, academic papers, industry stories and simulated environments. There will be a mixture of practical and theoretical formative practice exercises which will help students build knowledge and confidence in preparation for summative (formal) assessment.
RESOURCES
Cisco Networking essentials (Cisco netacad)
Cisco Introduction to Cybersecurity (Cisco netacad)
VMWare Workstation
Kali Linux
ParrotOS – Security Edition
REFERENCE TEXTS
All texts and electronic resources will be updated and refreshed on an annual basis and available for students via the online Study Links resource platform. All reference materials will be collated and curated and aligned to Equality, Diversity & Inclusion indicators.
Ozkaya, E. (2019) Cybersecurity: The Beginner’s Guide. 1st edn. Packt Publishing Ltd
The National Cyber Security Centre (2019) CyBOK: The Cyber Security Body of Knowledge. Version 1.0. The National Cyber Security Centre
Trusler, C, (2021), An Introduction To Cyber Security: The Complete Guidance For Beginners: Conclusion Of Cyber Security, Independently published
Shinde, A, (2021), Introduction to Cyber Security: Guide to the World of Cyber Security, Notion Press
Fitgerald, G, et. al. (2021), Business Data Communications and Networking, 14th Edition, Wiley
WEB DESCRIPTOR
This module will prepare students to understand communications principles and implement a small network using industry grade equipment. Once this is completed you will be able to define the term Cybersecurity, identify attacks and threat attackers allowing you to understand data privacy and how to protect the user and organisation. This module will contain Theory and Practical implementations ensuring you have a well-rounded knowledge.