| Module Title |
Network Security |
| Module Code |
CSC1134 (ITS: CA645) |
|
Faculty |
Computing |
School |
Engineering & Computing |
|
NFQ level |
9 |
Credit Rating |
7.5 |
|
|
Description
The aim of the course is to introduce the student to the issues that arise when we consider the security of computer networks, from both a "white-hat" (defensive), and "black-hat" (offensive) perspective.
|
Learning Outcomes
1. Identify the threats that exist against computer networks 2. Deploy defences to mitigate network security threats 3. Advise those concerned with their network security on corrective measures 4. Assess the top threats to internet-facing applications 5. Securely configure network devices 6. Deploy defences across both IPv4 and IPv6 networks
|
| Workload | Full time hours per semester | | Type | Hours | Description |
|---|
| Lecture | 36 | Classroom lectures | | Laboratory | 12 | Lab exercises | | Independent Study | 140 | Independent learning |
| Total Workload: 188 |
|
|
| Section Breakdown | | CRN | 20409 | Part of Term | Semester 2 | | Coursework | 0% | Examination Weight | 0% | | Grade Scale | 40PASS | Pass Both Elements | Y | | Resit Category | RC1 | Best Mark | N | | Module Co-ordinator | Darragh O'Brien | Module Teacher | Renaat Verbruggen |
|
| Assessment Breakdown |
| Type | Description | % of total | Assessment Date |
| In Class Test | In-class test | 15% | Week 10 | | Group assignment | Network security assignment | 15% | Week 12 | | Formal Examination | End-of-Semester Final Examination | 70% | End-of-Semester |
| Reassessment Requirement Type |
Resit arrangements are explained by the following categories;
RC1: A resit is available for both* components of the module.
RC2: No resit is available for a 100% coursework module.
RC3: No resit is available for the coursework component where there is a coursework and summative examination element.
* ‘Both’ is used in the context of the module having a coursework/summative examination split; where the module is 100% coursework, there will also be a resit of the assessment
|
|
Pre-requisite |
None
|
|
Co-requisite |
None |
| Compatibles |
None |
| Incompatibles |
None |
|
|
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml
|
Indicative Content and Learning Activities
Indicative syllabus Network models. Attacks across the network layers. Defences across the network layers. DNS. DNS attacks. Subnetting. VLANs. VLAN attacks and defences. Securing network devices. Malware. Packet filtering. Firewalls. Wireless networks. Wireless network security. Working with network simulators.
|
Indicative Reading List
Books:
- Bruce Schneier: 2004, Secrets and lies, Wiley, Indianapolis, Ind., 0-471-45380-3
- Joel Scambray, Stuart McClure, George Kurtz: 2001, Hacking exposed, Osborne/McGraw-Hill, Berkeley, Calif., 978-0072127485
- Cyrus Peikari, Seth Fogie: 2003, Maximum wireless security, Sams, Indianapolis, Ind., 978-0672324888
- Stephen Northcutt: 2003, Inside network perimeter security, New Riders, Indianapolis, Ind., 978-0735712324
- William Stallings: 2003, Network security essentials, Pearson Education, Upper Saddle River, NJ, 978-0130351289
Articles: None |
Other Resources
None |
|
|
|
|