Course description
Course Description
This course explores security issues in the modern, networked environment in which we live and work. Modules give in-depth knowledge of the issues involved in securing computer systems, both stand-alone and networked, looking at the types of attack, how one hardens systems, detects intruders, and so on. Topics such as cryptography, secure communication and virtual private networks are all explored. A background in computer science, electronic engineering or a related discipline is appropriate; graduates with these skills are typically employed as computer security specialists in large financial institutions.
Modules and Options
The lists of modules below represent the range of options available for each year of study. This may not be a complete list of the options you will study, and may be subject to change, so please contact the department for further details.
Stage 1
ADVANCED IP BASED SERVICES
Compulsory: COMPUTER SECURITY
Compulsory: INTRODUCTION TO JAVA
Compulsory: NETWORK CONCEPTS
Compulsory: NETWORKING PRACTICE
Compulsory: NETWORKS LABORATORY
Compulsory: PROFESSIONAL PRACTICE AND RESEARCH METHODOLOGY
Core: MSC PROJECT/DISSERTATION
CRYPTOGRAPHY AND CODES
MOBILE COMMUNICATIONS
NETWORK SECURITY
NETWORKED AUDIO AND VIDEO
PERVASIVE COMPUTING AND AMBIENT INTELLIGENCE
Teaching and Assessment Methods
A: Knowledge and Understanding
Learning Outcomes
A1 : The principles that underlie computer networks and the design and implementation of modern networks.
A2 : Practical issues concerning computer networks, including planning, configuration, monitoring and security.
A3 : The fundamentals of the gamut of possible security problems and detailed knowledge of the most important ones.
A4 : The protection of at least one networked computer system against security breaches.
A5 : Advanced topics in selected areas of modern computer and network security.
A6 : A selected current research area, including practical experience in it.
Teaching Methods
A1 and A3 are developed through lectures and coursework.
A2 is developed through lectures and network laboratory experiments.
A4 is developed through lectures and software laboratory experiments.
A5 is developed mainly through lectures that involve, in some cases, industrial lecturers who emphasise current industrial practices, and project.
A6 is developed principally through a research project.
Assessment Methods
A1-A4 are examined through coursework, tests, and examinations.
A5 is assessed through examinations, one module through exam and course work, and project.
A6 is assessed by means of a written report and oral defence.
B: Intellectual/Cognitive Skills
Learning Outcomes
B1 : Integrate knowledge and information in order to explain and evaluate the security weaknesses of networks of computers.
B2 : Use data and knowledge in order to improve the security of a modern computer network.
B3 : Assimilate and link information presented in different courses.
B4 : Plan and conduct an independent research project under the guidance of a supervisor.
Teaching Methods
B1 and B2 are developed principally through lectures, problem classes, seminars and practical work.
B3 is mostly developed through problem classes, research project, course work and practicals.
B4 is developed through research project guided by the Supervisor.
Assessment Methods
B1 and B2 are assessed through written examinations and oral assessment in the networks laboratory.
B3 and B4 are assessed principally through reports on practical work, including the project report.
C: Practical Skills
Learning Outcomes
C1 : Developing and/or install computer programs that implement network security policies.
C2 : Making effective use of software packages for the handling, analysis and presentation of security-related data.
C3 : Writing and reporting complex technical concepts concerned with security in a readable and balanced way.
C4 : Demonstrate inter-personal skills and participate actively in teamwork.
C5 : Show self-motivation, self-discipline and initiative.
Teaching Methods
C1 are developed in lectures and practicals in the networks and software laboratories.
C2 - C5 are developed in the laboratories and in project work.
Assessment Methods
C1 and C2 are assessed in reports on laboratory experiments.
C3 is assessed principally in the project report and to a lesser extent in reports on experiments.
C4 and C5 are assessed through oral examination of selected practicals and the project oral.
D: Key Skills
Learning Outcomes
D1 : To report effectively, both written and oral, in structured fashion on independent and group work.
D2 : To use current computer systems for communication, data acquisition, data management, and data analysis.
D3 : To analyse technical problems involving numerical values.
D4 : To learn top-down/bottom-up approach and systematically explore, combine, deduce techniques for solving complex problems.
D5 : To work as part of a group to set-up experiments and do measurement, and analyse the associated results.
D6 : To evaluate background knowledge, assess learning pace, plan work with realistic targets.
Teaching Methods
D1, D2 are developed through coursework and project work and project reports.
D3 and D4 are developed through problem classes, project work and course work.
D5 is developed through practicals.
D6 is developed through project work, practicals and course work.
Assessment Methods
D1 is assessed through oral and written project report and laboratory report.
D2 is assessed through project work, laboratory work and course work.
D3 is assessed mainly through the examination.
D4 is assessed through the examination, project work and course work.
D5 is assessed through the laboratory work.
D6 is assessed through project.