Module Descriptors
VIRTUALISATION AND NETWORK SECURITY
COMP50042
Key Facts
Digital, Technology, Innovation and Business
Level 5
20 credits
Contact
Leader: Janet Francis
Hours of Study
Scheduled Learning and Teaching Activities: 65
Independent Study Hours: 135
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Burton and South Derbyshire College, UG Semester 2
Sites
  • Burton and South Derbyshire College
Assessment
  • WRITTEN - 45 MINUTES weighted at 50%
  • TECHNICAL PRACTICAL/PRESENTATION - 10 MINUTES weighted at 50%
Module Details
LEARNING OUTCOMES
1. ASSESS AND EVALUATE THE ARCHITECTURAL PRINCIPLES AT THE FOREFRONT OF PROFESSIONAL PRACTICE CONCERNING USING VIRTUALIZED TECHNOLOGY.
Learning

2. SELECT, JUSTIFY, INSTALL AND CONFIGURE COMPLEX FIREWALL AND VPN TECHNOLOGY USING COMMERCIAL GRADE EQUIPMENT.
Knowledge & Understanding
Enquiry
Problem Solving

3. DEMONSTRATE A CRITICAL UNDERSTANDING OF THE DIFFERENT ASPECTS OF VIRTUALIZATION, SECURITY THREATS, ROUTED AND SWITCHED DATA AND MANAGEMENT PLANE SECURITY CONTROLS, VPN, FIREWALLS IN LINE WITH ADVANCED PROFESSIONAL STANDARDS.
Knowledge & Understanding
Analysis
Application

4. DISCUSS THE SOCIAL AND ENVIRONMENTAL IMPACT OF VIRTUALISATION TECHNOLOGY.
Analysis
Communication
ADDITIONAL ASSESSMENT DETAILS
WRITTEN: Assessment 1 - is a practical skills test configuring an industrial specification firewall, implementing an appropriate VPN technology.

TECHNICAL PRACTICAL/PRESENTATION: Assessment 2 – Documents decisions related to the practical case study.
INDICATIVE CONTENT
This module will look in detail at the technologies which can be considered under the umbrella title of virtual computing:
- Cloud Computing
- Virtual OS
- Virtual Storage
- Grid Computing
- Virtual Hardware
- Virtual Software

In addition, this module focuses on the core security concepts and skills needed for the installation, troubleshooting, and monitoring of network devices. The module helps students to master the topics related to configuring advanced firewall technologies and Virtual Private Network (VPN) solutions and security principles with regard the Cisco Adaptive Security Appliance (ASA) device.87
WEB DESCRIPTOR
This module looks at network security and virtualisation of hardware and software and the effect upon the commercial IT market, infrastructure, and the wider customer base. Within the module you will look at the hypervisor technologies which are currently used to understand how these interact with hardware and allow a virtualized OS to work either natively or through a host OS. You will also look in detail at the different virtual environments, with Cloud and virtualised storage, hardware for redundancy purposes and operating systems, and learning environments. In addition, this module provides you with the skills to be work-ready, not only the practical skills but also the best security practices used by industry. You will be able to analyse a current network provision, analyse the output and propose/implement an effective solution.
LEARNING STRATEGIES
The module will be delivered using a combination of independent research, lectures and tutorials. The lectures are intended to give the theory work and the tutorials are an opportunity to test out the theories. The practical session each week will be used to provide practical networking experience and reinforce theory of the lectures. The lab should be available outside of scheduled lesson times for you to practise on the equipment. The main learning environment that will be used is Blackboard. Each week you will find presentation slides, reading material and additional learning resources uploaded to the module folder in Blackboard. The instructors will be monitoring your progress, providing their expertise where necessary for assisting you in solving the problems given to you every week.

REFERENCE TEXTS

Bhowmik, S. (2017), Cloud Computing, Cambridge University Press, ISBN-10: 1316638103

McMillan, T. (2018) CCNA Security Study Guide: Exam 210-260, Sybex; 2nd ed. edition, ISBN-13: 978-1119409939, ISBN-10: 1119409934

Santos, O. (2015), CCNA Security 210-260 Official Cert Guide, Omar Santos, CISCO Press; Har/Cdr edition, ISBN-13: 978-1587205668, ISBN-10: 1587205661

VMWare Press (2012) VMware VSphere 5 Building a Virtual Datacenter: Integration into the Datacenter, VMware Press, ISBN 0321832213.

An annually updated keylinks online resource bank will be made available.

RESOURCES
Specialist virtualisation and networking laboratory with Cisco equipment