Module Descriptors
NETWORKING CONCEPTS AND CYBER SECURITY
COMP40002
Key Facts
Digital, Technology, Innovation and Business
Level 4
30 credits
Contact
Leader: Mostafa Tajdini
Hours of Study
Scheduled Learning and Teaching Activities: 104
Independent Study Hours: 196
Total Learning Hours: 300
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 1 to UG Semester 2
  • Occurrence B, Digital Institute London, UG Semester 1 to UG Semester 2
  • Occurrence D, British University Vietnam Hanoi, UG Semester 1 to UG Semester 2
  • Occurrence D, British University Vietnam Hanoi, UG Semester 1 to UG Semester 3
  • Occurrence F, Asia Pacific Institute of IT Sri Lanka (Colombo), UG Semester 1 to UG Semester 2
  • Occurrence I, Asia Pacific Institute of IT Sri Lanka (Kandy), UG Semester 1 to UG Semester 2
  • Occurrence J, Asia Pacific Institute of IT Sri Lanka (Colombo), UG Semester 2 to UG Semester 3
  • Occurrence L, Asia Pacific Institute of IT Sri Lanka (Kandy), UG Semester 2 to UG Semester 3
  • Occurrence M, Asia Pacific Institute of IT Sri Lanka (Colombo), UG Semester 3 to UG Semester 1
  • Occurrence N, Asia Pacific Institute of IT Sri Lanka (Kandy), UG Semester 3 to UG Semester 1
  • Occurrence O, Asia Pacific Institute of IT Sri Lanka (Colombo), UG Semester 2 to UG Semester 1
  • Occurrence P, Asia Pacific Institute of IT Sri Lanka (Kandy), UG Semester 2 to UG Semester 1
  • Occurrence Q, British University Vietnam Hanoi, UG Semester 2 to UG Semester 1
Sites
  • Asia Pacific Institute of IT Sri Lanka (Colombo)
  • Asia Pacific Institute of IT Sri Lanka (Kandy)
  • British University Vietnam Hanoi
  • Digital Institute London
  • Stoke Campus
Assessment
  • Group Assignment 1 - (2000-3000 words) weighted at 50%
  • Group Assignment 2 - (2000-3000 words) weighted at 50%
Module Details
Module Learning Outcomes
1. DEMONSTRATE A KNOWLEDGE OF THE OSI MODEL, TCP/IP MODEL AND IP ADDRESSING AND NETWORK DESIGN (SUBNETTING), AS WELL AS FUNDAMENTAL INTRODUCTORY CONCEPTS OF CYBER SECURITY. Knowledge and Understanding
Learning

2. EXPLAIN AND USE LAYER 2 AND 3 BASED TECHNOLOGY SUCH AS VLANS, THE SPANNING-TREE PROTOCOL, NETWORK MANAGEMENT PRINCIPLES, ROUTING PROTOCOLS AND ASSOCIATED TOOLS. Application
Communication

3. PERFORM PC, ROUTER, SWITCH, AND WAN INSTALLATION, CONFIGURATION AND TROUBLESHOOTING INCLUDING ACCESS CONTROL LISTS IN EXTENSIVE ROUTER BASED INTERNETWORKS AND DO SO IN A RESPONSIBLE AND SAFE MANNER.
Enquiry
Problem solving

4. UNDERTAKE SECURITY RISK ASSESSMENT FOR A SIMPLE IT SYSTEM AND PROPOSE RESOLUTION ADVICE, BEING ABLE TO IDENTIFY, ANALYSE AND EVALUATE SECURITY THREATS AND HAZARDS TO PLANNED AND INSTALLED INFORMATION SYSTEMS OR SERVICES (E.G. CLOUD SERVICES).
Problem Solving
Communication
Module Learning Strategies
This course will have lectures (52 hours) and practical’s (52 hours). The lectures will be looking at the academic aspects of networking and cyber security within commercial organisations. The underlying theory will be given in these sessions and reinforced through the use of the practical’s. The intention of this course is to give the student the skills needed to work on Cisco (or cyber security-based equipment) based live equipment in a commercial setting and as such the tutorials are the chance to work on the equipment and reinforce through experimentation what has been covered in the lectures. The student will also be given optional access to the Cisco Academy learning material if they wish to carry out extra study.
Module Special Admissions Requirements
None
Web Descriptor
This course is intended to equip you with not only the knowledge but also the practical skills to be able to create and understand an enterprise grade network. The Syllabus incorporates the content of the Cisco ICND1 qualification (Network fundamentals and routing/switching fundamentals). It also looks at Cybersecurity which is a growing challenge, in which different stakeholders are involved ranging from individuals up to organizations and governments. Effective information security requires participation, planning, and practice. This part of the module is designed to teach you the essential concepts of cybersecurity which are considered to be a gate for more advanced topics related to information security.
Indicative Content
Networking topics -
This module will look at fundamental aspects of the technology which underlies an enterprise grade network.

It introduces concepts around the OSI model, TCP/IP, network design and documentation, Ethernet routing and switching, CLI and configuration, network Troubleshooting LAN switched networks and campus architectures including VLAN's, Network Management and Access Control Lists, and Wireless Networks based on 802.11.

The module will also look at IP addressing and associated techniques including DHCP and NAT/PAT. Maintenance of network appliances and troubleshooting and the associated tools, for example Syslog will be explored. It will also look at the WAN based routing which will allow for global communications. The usage of these within the context of global remote working and linking different parts of the world together for group work and communications will be investigated.

Cyber Security topics -
This part of the module is concerned with fundamentals of cyber security. The contents of this module will focus on the essential concepts of cyber security.

You will be looking at:
IT security models
IT risk management
Cybersecurity principles applied to services, applications, servers, network devices (and devices in general)
Legal, ethical issues in cyber security
Information security policy and scope
ISO27001 & ISO27002
Incident response management
Access control (basics)
Basic concepts of network security (e.g. firewall, IDS, )
Backup and recovery (basics)
Data and system attacks
How to identify vulnerabilities and put in place safeguards
Concepts of Confidentiality, Integrity and Availability
Reference Texts
Barker, L. (2016) CCENT 100-105 Exam Cram, Pearson IT Certification, ISBN-10:¿0789756730, ISBN-13:¿978-0789756732
Campbell, A. (2016) Practical Information Security Management: A Complete Guide to Planning & Implementation, 2016, Apress
Empson, S. (2016), CCNA Routing and Switching Portable Command Guide (ICND1 100-105, ICND2 200-105, and CCNA 200-125), Cisco Press, 4th Edt. ISBN-10:¿1587205882, ISBN-13:¿978-1587205880
Franke, D,(2016) Cyber Security Basics, CreateSpace, ISBN: 9781522952190
Gollman, D. Computer Security, 2011, 3rd edition, Wiley, ISBN: 978-0470741153
Goodrich, M.T.,& R. Tamassia ,Introduction to Computer Security, 2013, Pearson, ISBN: 978-1292025407
HM Government, The UK Cyber Security Strategy Protecting and promoting the UK in a digital world,
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
International Organization for Standardization, ISO/IEC 27001:2013 - Information technology -- Security techniques -- Information security management systems -- Requirements". (Last reviewed 2019)
Johnson, T.A., Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare, 2015, ISBN-13: 978-1-48223923-2
Lammie, T. (2016) CCENT ICND1 study guide: Exam 100-105, Sybex, 3rd Edt. ISBN-10:¿1119288789, ISBN-13:¿978-1119288787
Odom, W. (2016) CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition. Cisco Press. ISBN-10:¿1587205807, ISBN-13:¿978-1587205804
Module Resources
Dedicated isolated Cyber lab with access to software and hardware systems

Access to Latest VM’s used to show and analyse cyber security issues and features

Specialist networking laboratories with Cisco equipment.

Access to specialist Security lab with multiple virtual machines and equipped with Windows and Linux.

For those students who wish to, access to the Cisco Academy portal where further material and learning resources are available. The Academy access part of the course is entirely optional but is highly recommended for working in the networking industry.
Additional Assessment Details
1. Group Assignment. This assignment will assess your practical skills of investigating and analysing risks and secure processes within a full commercial based system. 2000- 3000 words

2. Group Assignment. You are to design a networked solution for a multi-site new start-up company that is focused on e-sports. 2000- 3000 words