| Module Title |
Network Security |
| Module Code |
CSC1134 (ITS: CA645) |
|
Faculty |
Engineering & Computing |
School |
Computing |
|
NFQ level |
9 |
Credit Rating |
7.5 |
|
|
Description
The aim of the course is to introduce the student to the issues that arise when we consider the security of computer networks, from both a "white-hat" (defensive), and "black-hat" (offensive) perspective.
|
Learning Outcomes
1. 1F7A7DC3B93317F6DC587653677D1C9C2 2. Identify the threats that exist against computer networks 5. 1 6. 1F7A7DC3CBB06EDC507DB01F68E96062C 7. Deploy defences to mitigate network security threats 10. 2 11. 1F7A7DC4CD96C0C09562CFD5CA4FF69C7 12. Advise those concerned with their network security on corrective measures 15. 3 16. 1F7A7DC9ACCFBC7C9E64D7527ED4D64CF 17. Assess the top threats to internet-facing applications 20. 4 21. 1F7A7DCAAA542AC22B313C9E5ACA82BD0 22. Securely configure network devices 25. 5 26. 1F7A7DCABFE1245C12FED3D6F72622E5D 27. Deploy defences across both IPv4 and IPv6 networks 30. 6
|
| Workload | Full time hours per semester | | Type | Hours | Description |
|---|
| Lecture | 36 | Classroom lectures | | Laboratory | 12 | Lab exercises | | Independent Study | 140 | Independent learning |
| Total Workload: 188 |
|
|
| Section Breakdown | | CRN | 20409 | Part of Term | Semester 2 | | Coursework | 30% | Examination Weight | 70% | | Grade Scale | 40PASS | Pass Both Elements | N | | Resit Category | RC1 | Best Mark | N | | Module Co-ordinator | Darragh O'Brien | Module Teacher | Renaat Verbruggen |
|
| Assessment Breakdown |
| Type | Description | % of total | Assessment Date |
| In Class Test | In-class test | 15% | Week 9 | | In Class Test | In-class test | 15% | Week 12 | | Formal Examination | End-of-Semester Final Examination | 70% | End-of-Semester |
| Reassessment Requirement Type |
Resit arrangements are explained by the following categories;
RC1: A resit is available for both* components of the module.
RC2: No resit is available for a 100% coursework module.
RC3: No resit is available for the coursework component where there is a coursework and summative examination element.
* ‘Both’ is used in the context of the module having a coursework/summative examination split; where the module is 100% coursework, there will also be a resit of the assessment
|
|
Pre-requisite |
None
|
|
Co-requisite |
None |
| Compatibles |
None |
| Incompatibles |
None |
|
|
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml
|
Indicative Content and Learning Activities
Indicative syllabus Network models. Attacks across the network layers. Defences across the network layers. DNS. DNS attacks. Subnetting. VLANs. VLAN attacks and defences. Securing network devices. Malware. Packet filtering. Firewalls. Wireless networks. Wireless network security. Working with network simulators.
|
Indicative Reading List
Books:
- Bruce Schneier: 2004, Secrets and lies, Wiley, Indianapolis, Ind., 0-471-45380-3
- Joel Scambray, Stuart McClure, George Kurtz: 2001, Hacking exposed, Osborne/McGraw-Hill, Berkeley, Calif., 978-0072127485
- Cyrus Peikari, Seth Fogie: 2003, Maximum wireless security, Sams, Indianapolis, Ind., 978-0672324888
- Stephen Northcutt: 2003, Inside network perimeter security, New Riders, Indianapolis, Ind., 978-0735712324
- William Stallings: 2003, Network security essentials, Pearson Education, Upper Saddle River, NJ, 978-0130351289
Articles: None |
Other Resources
None |
|
|
|
|