Module Descriptors
VIRTUALISATION AND SECURITY
COMP50084
Key Facts
Digital, Technology, Innovation and Business
Level 5
20 credits
Contact
Leader: Stephen Cahill
Hours of Study
Scheduled Learning and Teaching Activities: 6
Independent Study Hours: 194
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 1
  • Occurrence B, Stoke Campus, UG Semester 2
  • Occurrence C, Stoke Campus, UG Semester 3 to UG Semester 1
Sites
  • Stoke Campus
Assessment
  • PRACTICAL SKILLS PORTFOLIO weighted at 50%
  • CLASS TEST - 1 HOURS weighted at 50%
Module Details
INDICATIVE CONTENT
This module will give an introductory and advancing knowledge looking at a number of technologies which can be considered under the umbrella title of virtual computing:



- Virtual Machines

- Virtual Storage

- Grid Computing

- Virtual Hardware

- Virtual Software

- Virtualised Security Appliances

- Virtualised Topologies



The module will study the details on how these technologies operate and also consider the impact upon their use, how they operate on an IPv4 based infrastructure. Potential commercial benefits will be considered, environmental and social impact will be examined. The module will provide the student with the information and will at completion be able to demonstrate a good understanding of the technology from the academic, professional and practical aspects of its use.
ADDITIONAL ASSESSMENT DETAILS
Practical skills portfolio - A practical assessment portfolio that is based on design and installation of networking scenarios through a given case study (Learning Outcome 1).

Class-test - A class-test in the form of MCQs and short written answers done via the VLE and covers prevention and evaluation of security threats and understanding of virtualisation concepts (Learning Outcomes 2 and 3).
LEARNING STRATEGIES
There will be 6 weekly lectures to drive the delivery of main module concepts. This will be accompanied by self-study virtual labs that support practical work to reinforce learning and provide associated networking skills.
LEARNING OUTCOMES

1. Install, Configure and Test virtualisation solutions

Application,
Problem Solving,
Knowledge and Understanding



2. Critically evaluate security threats and preventive measures that can be taken in a virtualised environment

Analysis,
Reflection



3. Demonstrate a systematic understanding of the different aspects of virtualisation and the potential commercial, social and environmental impact

Knowledge and Understanding,
Reflection
TEXTS
Li, Z. et al. (2022) ‘Research on New Virtualization Security Protection Management System Based on Cloud Platform’, Journal of Physics: Conference Series, 2146(1), p. 12010–. Available at: https://doi.org/10.1088/1742-6596/2146/1/012010.

Packt Publishing (2013) VMware Workstation - No Experience Necessary, Packt Publishing

Pujolle, G. (2020) Software Networks: Virtualization, SDN, 5G, and Security. 2nd edn. Newark: Wiley. Available at: https://doi.org/10.1002/9781119694748.

VMWare Press (2019) VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide, VMWare Press
VMWare Press (2012) VMware VSphere 5 Building a Virtual Datacenter: Integration into the Datacenter, VMware Press
RESOURCES
X86 based PC with V-TX or AMD-V capability. For best results a minimum of 8Gb RAM is needed

Software provided for Practical Work

Blackboard VLE
WEB DESCRIPTOR
This module looks at virtualisation of hardware and software and the effect upon the commercial IT market, infrastructure and the wider customer base. Within the module you will look at the hypervisor technologies which are currently used to understand how these interact with hardware and allow a virtualized OS to work either natively or through a host OS. You will also look in detail at the different virtual environments, virtualised storage, hardware for redundancy purposes and operating systems, and learning environments. This technology does bring a number of benefits and risks and you will be expected to understand these and see where the benefits and risks are within this, especially with security considerations. The supporting infrastructure will also be looked at to give you a holistic view of how virtualisation will be used within companies now and increasingly in the future.