Module Descriptors
CYBER OPERATIONS
COMP50037
Key Facts
Digital, Technology, Innovation and Business
Level 5
20 credits
Contact
Leader: Janet Francis
Hours of Study
Scheduled Learning and Teaching Activities: 65
Independent Study Hours: 135
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Burton and South Derbyshire College, UG Semester 1
Sites
  • Burton and South Derbyshire College
Assessment
  • A written report evaluating cyber operations systems - 1,500 Words weighted at 50%
  • Demonstration of a cyber operations function - 10 Minutes weighted at 50%
Module Details
LEARNING OUTCOMES
1. EXPLAIN AND CRITICALLY EVALUATE PC OPERATING SYSTEMS, NETWORK ATTACKS AND SOC (SECURITY OPERATION CENTRE) FUNCTIONALITY.
Analysis
Communication
Knowledge & Understanding
Reflection

2. CRITICALLY EVALUATE THE APPLICATION OF THE DIFFERENT TYPES OF CYBER OPERATIONS AND THEIR UTILIZATION AND DEPLOYMENT BASED ON THE SCENARIO AT HAND.
Application
Knowledge & Understanding

3. DEMONSTRATE CRITICAL UNDERSTANDING AND KNOWLEDGE OF MANAGING AN INFORMATION INFRASTRUCTURE IN TERMS OF DETERRENCE, DETECTION, PROTECTION AND REACTION TO ACCESS. Reflection
Problem Solving
Knowledge & understanding

4. DISCUSS CRITICALLY LEGAL, SOCIAL AND ETHICAL ISSUES RELATING TO NETWORK SECURITY AND SOC FUNCTIONALITY.
Analysis
Communication
ADDITIONAL ASSESSMENT DETAILS
WRITTEN: The Assessment will research approaches to design and deployment of cyber operations systems
PRACTICAL: A demonstration of a cyber operations function that showcases deterrence, detection, or defence
INDICATIVE CONTENT
This module starts by looking at cybersecurity and the Security Operations Centre, explores PC operating systems, the principles of network attacks, endpoint security, monitoring, data analysis and incident response handling.

It also looks at Legal, social, and ethical issues relating to network security.


WEB DESCRIPTOR
This module will teach you about how computer networks can be secured in addition to securing computer operating systems. All organisations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in Security Operations Centres (SOC’s) keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats. This module covers cyber security including information/infrastructure security. This module aligns in topics to vendor qualifications for example the Cisco CyberOps Associate (CBROPS 200-201) qualification.

LEARNING STRATEGIES
Lectures will introduce key topics and concepts with tutor-assisted practical sessions. In the practical sessions you will get hands-on experience of the principles and under-pinning knowledge taught in the lectures. Formative, self-directed exercises to support transfer of knowledge and understanding will be undertaken weekly. Self-directed learning using on-line material will also be used to help develop your research and analytical skills. There will be weekly one-hour lectures to supplement on-line material

REFERENCE TEXTS

Santos, O and Muniz, J (2017), CCNA Cyber Ops (SECFND #210-250 and SECOPS #210-255) Official Cert Guide Library, 1/e, ISBN-10: 1587145006, ISBN-13: 978-1587145001

Santos, O. (2020). Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide, Cisco Press. ISBN-13: 978-0-13-680782-7

McNab, C. (2016). Network Security Assessment: Know Your Network 3rd Edition, O’Reilly. ISBN-10: 149191095X, ISBN-13: 978-1491910955

An annually updated keylinks online resource bank will be made available

RESOURCES
Specialist networking laboratory with Cisco (or equivalent) equipment including L3/4 switches and routers

Virtual machines for example Kali Linux, Security Onion and Metasploitable.

Other appropriate software for example Kiwi Syslog Server and Wireshark.