Module Descriptors
CYBER OPERATIONS AND NETWORK SECURITY
COMP50002
Key Facts
Digital, Technology, Innovation and Business
Level 5
30 credits
Contact
Leader: Mohammad Hasan
Hours of Study
Scheduled Learning and Teaching Activities: 78
Independent Study Hours: 222
Total Learning Hours: 300
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 1 to UG Semester 2
  • Occurrence B, Digital Institute London, UG Semester 1 to UG Semester 2
  • Occurrence C, British University Vietnam, UG Semester 1 to UG Semester 2
  • Occurrence C, British University Vietnam, UG Semester 1 to UG Semester 3
  • Occurrence D, Asia Pacific Institute of Information Technology Sri Lanka (Colombo), UG Semester 1 to UG Semester 2
  • Occurrence F, Asia Pacific Institute of Information Technology Sri Lanka (Colombo), UG Semester 3 to UG Semester 1
  • Occurrence F, Asia Pacific Institute of Information Technology Sri Lanka (Colombo), UG Semester 3 to UG Semester 2
  • Occurrence G, Asia Pacific Institute of Information Technology Sri Lanka (Colombo), UG Semester 2 to UG Semester 1
  • Occurrence G, Asia Pacific Institute of Information Technology Sri Lanka (Colombo), UG Semester 2 to UG Semester 3
Sites
  • Asia Pacific Institute of Information Technology Sri Lanka (Colombo)
  • British University Vietnam
  • Digital Institute London
  • Stoke Campus
Assessment
  • Practical Assessment - 2 hours weighted at 50%
  • Written in class test weighted at 50%
Module Details
Module Learning Outcomes
1. EXPLAIN AND CRITICALLY EVALUATE PC OPERATING SYSTEMS, NETWORK ATTACKS AND SOC (SECURITY OPERATION CENTRE) FUNCTIONALITY.
Analysis
Communication
Knowledge and Understanding
Reflection

2. EXPLAIN AND CRITICALLY EVALUATE SECURITY THREATS, THE SECURING OF NETWORK DEVICES, AAA, VPN, IPS, FIREWALLS AND CRYPTOGRAPHIC SYSTEMS.
Analysis
Communication
Knowledge and Understanding
Reflection

3. INSTALL, CONFIGURE AND TEST FIREWALL AND VPN TECHNOLOGIES ACCORDING TO INDUSTRY STANDARDS USING COMMERCIAL EQUIPMENT.
Application
Problem Solving

4. DISCUSS CRITICALLY LEGAL, SOCIAL AND ETHICAL ISSUES RELATING TO NETWORK SECURITY AND SOC FUNCTIONALITY.
Analysis
Communication
Module Assessment Details
1. A practical assessment typically at the end of the second teaching block covering Learning Outcomes 1 and 3.

2. An in class written test covering Learning Outcomes 1, 2 and 4 at the end of the first teaching block.
Module Indicative Content
This module starts by looking at cybersecurity and the Security Operations Centre, explores PC operating systems, the principles of network attacks, endpoint security, monitoring, data analysis and incident response handling. In the second semester the module looks at types of threat, securing access to devices, AAA, implementing firewall and intrusion protection technologies, layer 2 security features, cryptographic systems, VPN's and how to manage a secure network. It also looks at Legal, social and ethical issues relating to network security.
Module Learning Strategies
26 hours lectures, 52 hours labs/tutorials
Self-directed learning using on-line material
Weekly one-hour lectures to supplement on-line material
On-line multiple-choice tests to give formative feedback
Lab sessions every week to gain practical networking experience and reinforce theory
Investigation using the Web
Module Texts
McNab, C. (2016). Network Security Assessment: Know Your Network 3rd Edition, O’Reilly. ISBN-10: 149191095X, ISBN-13: 978-1491910955

McMillan, T. (2018), CCNA Security Study Guide: Exam 210-260 2nd ed. Edition, Sybex. ISBN-10: 1119409934, ISBN-13: 978-1119409939

Santos, O and Muniz, J (2017), CCNA Cyber Ops (SECFND #210-250 and SECOPS #210-255) Official Cert Guide Library, 1/e, ISBN-10: 1587145006, ISBN-13: 978-1587145001
Module Resources
Specialist networking laboratory with Cisco equipment
On-line learning material provided by CISCO Inc.

NOTE - Instructors teaching this module who use the CISCO material must have completed CCNA 1, 2, 3 and 4, INS1&2, and CCNA Cyberops
Module Special Admissions Requirements
Pre-requisites Networking Concepts and Cyber Security (COMP40002)

Web Descriptor
This module will teach you about how today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in Security Operations Centers (SOC’s) keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats.