Module Descriptors
CYBER SECURITY SKILLS PORTFOLIO
COMP50043
Key Facts
Digital, Technology, Innovation and Business
Level 5
20 credits
Contact
Leader: Christopher Hawkins
Hours of Study
Scheduled Learning and Teaching Activities: 39
Independent Study Hours: 161
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 1
Sites
  • Stoke Campus
Assessment
  • ASSIGNMENT 1 REPORT - 1500 WORDS weighted at 40%
  • ASSIGNMENT 2 REPORT - 2000 WORDS weighted at 60%
Module Details
Assessment Details
Assignment 1 covers Learning Outcomes 1, 2 and 4.
Assignment 2 covers Learning Outcomes 3 and 5

100% Coursework
Indicative Content
CYBER SKILLS
Fundamental concepts of security engineering.
The significance of security protocols and frameworks.
Systems-administration, attack scenarios, failure mechanisms and defensive solutions
Operation security
Business continuity and disaster recovery

ETHICAL HACKING SKILLS
Technical foundation of hacking
Understanding business aspects and the importance of performing penetration testing
Introduction to active and passive data gathering
Understanding Foot printing and scanning
System hacking and enumeration
The use of sniffers and methods to perform session hijacking and denial of service to gain access
Wireless technologies, security, and wireless attacks
Intrusion detection and multilevel security

Web Descriptors
The module has been designed to provide students with the necessary information and skill set relating to Cyber Security and System Testing using Ethical Hacking.

It will help them in the development, testing and management of a comprehensive approach to security practices. The module introduces students to a variety of security topics including fundamental concepts of security engineering, operational security and system hacking and enumeration.

To manage a secure a system it is essential for computer security professionals to understand the structure, configuration, tools, and techniques that hackers rely upon to successfully commit their act. It is also important to test the network regularly and discover any vulnerability due to misconfiguration or poor patching.
Learning Strategies
26 hours of lectures and 52 hours of practical/tutorials

Practical tasks and workshops will be used to re-enforce and apply theory to encourage an analytical and problem-based approach. Students will be required to complete background reading prior to each lecture / tutorial. This background reading will help them underpin the practical demonstrations. Where appropriate students will be given informative assessment to complete and evaluate with their peers.
Texts
Data Protection Act 2018 and GDPR 2018 ISO/IEC/IEEE 29148:2011

Easttom, C. (2016). Computer security fundamentals. 3rd edn. Indianapolis, IN: Pearson Education. ISBN: 078975746
x; 9780789757463.

HM Government, National Cyber Security Strategy 2016 to 2021, Published on Nov. 2016, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/-national_cyber_security_strategy_2016.pdf

International Organization for Standardization, ISO/IEC 27001:2013 - Information technology -- Security techniques -- Information security management systems -- Requirements".

ISO 8000-8:2015 Data quality -- Part 8: Information and data quality: Concepts and measuring

Johnson, T.A. (2015). Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare. ISBN-13: 978-1-48223923-2

Meyers, M. (2016). Comptia A+ Certification All-In-One Exam Guide, 9th edn. McGraw-Hill Education. ISBN: 9781259589515
Wu, C. and Irwin, J. (2016). Introduction to computer networks and cybersecurity. Hoboken: CRC Press., ISBN:1466572140

Simpson, M., Backman, K. and Corley, J. (2013). Hands-on ethical hacking and network defence. Boston, MA: Course Technology. ISBN: 1133935613
Resources
Specialised software and hardware as provided in Cyber Security lab, including virtualised servers/attack targets.

Lecture notes and tutorial notes provided via blackboard.

Supplementary handouts/resources as and when appropriate provided by lecturer(s).