Module Descriptors
COMPUTER ARCHITECTURE, NETWORKS AND CYBER
COMP40036
Key Facts
Digital, Technology, Innovation and Business
Level 4
40 credits
Contact
Leader: Janet Francis
Hours of Study
Scheduled Learning and Teaching Activities: 130
Independent Study Hours: 270
Total Learning Hours: 400
Pattern of Delivery
  • Occurrence A, Burton and South Derbyshire College, UG Semester 1 to UG Semester 2
Sites
  • Burton and South Derbyshire College
Assessment
  • A class test to assess core digital hardware skills testing - 1 Hour weighted at 20%
  • In class practical assessment based on industry case study focusing on Networks. - 2 Hours weighted at 40%
  • Knowledge and understanding of the core principles of Cyber Security based upon an industry case study - 1,500 Words weighted at 40%
Module Details
LEARNING OUTCOMES
1. TO DEVELOP A CLEAR AND DETAILED KNOWLEDGE RELATED TO CORE DIGITAL HARDWARE SKILLS, CPU, RAM, DISK and OS Management.
Knowledge and Understanding, Application.

2. DEMONSTRATE A KNOWLEDGE OF THE OSI MODEL, TCP/IP MODEL AND IP ADDRESSING AND NETWORK DESIGN (SUBNETTING), AS WELL AS FUNDAMENTAL INTRODUCTORY CONCEPTS OF CYBER SECURITY. Knowledge and Understanding, Learning, Application.

3. EXPLAIN AND USE LAYER 2 AND 3 BASED TECHNOLOGY SUCH AS VLANS, THE SPANNING-TREE PROTOCOL, NETWORK MANAGEMENT PRINCIPLES, ROUTING PROTOCOLS AND ASSOCIATED TOOLS EFFECTIVELY.
Knowledge and Understanding, Learning, Application.

4. UNDERTAKE SECURITY RISK ASSESSMENT FOR A SIMPLE IT SYSTEM AND PROPOSE RESOLUTION ADVICE, BEING ABLE TO IDENTIFY, ANALYSE AND EVALUATE SECURITY THREATS AND HAZARDS TO PLANNED AND INSTALLED INFORMATION SYSTEMS OR SERVICES.
Problem Solving, Communication, Application.
ADDITIONAL ASSESSMENT DETAILS
1. The class test will be an online exam covering the concepts of computer hardware architecture. (LOs 1 and 2)
2. The practical class assessment will involve the configuration of network appliances, for example routers and switches to a given industry live brief/case study. (LO 3)
3. The final assignment will be an industry case study where students’ apply their practical skills of investigating and analysing risks and secure processes of a commercial system. (LO 4)
INDICATIVE CONTENT
Computer Architecture topics -
Computer number systems
System block design of a Computer

Networking topics -
This module will look at fundamental aspects of the technology which underlies an enterprise grade network.

It introduces concepts around the OSI model, TCP/IP, network design and documentation, Ethernet routing and switching, CLI and configuration, network Troubleshooting LAN switched networks and campus architectures including VLAN's, Network Management and Access Control Lists, and Wireless Networks based on 802.11.

The module will also look at IP addressing and associated techniques including DHCP and NAT/PAT. Maintenance of network appliances and troubleshooting and the associated tools, for example Syslog will be explored. It will also look at the WAN based routing which will allow for global communications. The usage of these within the context of global remote working and linking different parts of the world together for group work and communications will be investigated.

Cyber Security topics -
This part of the module is concerned with fundamentals of cyber security. The contents of this module will focus on the essential concepts of cyber security.

You will be looking at the 8 main domains within Cyber Security:
1. Security & Risk management
2. Asset security
3. Security Architecture & Engineering
4. Communication & network security
5. Identity & Access management
6. Security Assessment & Training
7. Security Operations
8. Software Development security
WEB DESCRIPTOR
This module is intended to equip you with not only the knowledge but also the practical skills to be able to create and understand an enterprise grade computing system. Starting with the Client Access Layer, understanding fundamental computer principles to exampling computer hardware. The module incorporates the content of associate level vendor qualifications for example Cisco CCNA. It covers Cybersecurity, in which different stakeholders are involved ranging from individuals up to organisations and governments. The module is designed to teach you the essential concepts of hardware, networks and cybersecurity, considered to be a gateway for more advanced topics related to information and system security.
LEARNING STRATEGIES
The module will be delivered using a combination of independent research, lectures and tutorials. The lectures are intended to give the theory work and the tutorials are an opportunity to test out the theories. The practical session each week will be used to provide practical networking experience and reinforce theory of the lectures. The lab should be available outside of scheduled lesson times for you to practise on the equipment. The main learning environment that will be used is Blackboard. Each week you will find presentation slides, reading material and additional learning resources uploaded to the module folder in Blackboard. The Instructors will be monitoring your progress, providing their expertise where necessary for assisting you in solving the problems given to you every week.

REFERENCE TEXTS
An Introduction to ISO 27001…. ISO 27008 (2019) https://www.27000.org

Empson, S. (2016), CCNA Routing and Switching Portable Command Guide (ICND1 100-105, ICND2 200-105, and CCNA 200-125), Cisco Press, 4th Edt. ISBN-10:¿1587205882, ISBN-13:¿978-1587205880

Franke, D., (2016) Cyber Security Basics, CreateSpace, ISBN: 9781522952190

Gollman, D. (2011), Computer Security, 3rd edition, Wiley, ISBN: 978-0470741153

Johnson, T.A., (2015), Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare, ISBN-13: 978-1-48223923-2

The National Cyber Security Centre (Annual Review 2020) https://www.ncsc.gov.uk/news/annual-review-2020

Zhang, N., (2019) Cyber Security: The Beginners Guide to Learning the Basics of Information Security and Modern. ISBN 97813453-2

Clements, A. (2018 Edition/Reprint), The Principles of Computer Hardware, Oxford University Press,
ISBN 978-0199273133

An annually updated keylinks online resource bank will be made available

RESOURCES

Suitable enhanced teaching room with access to hardware resources.

Dedicated isolated Cyber lab with access to software and hardware systems

Access to Latest VM’s used to show and analyse cyber security issues and features

Specialist networking laboratories with Cisco or equivalent equipment.

Access to specialist Security lab with multiple virtual machines and equipped with Windows and Linux.