Advanced Network Security - COMP8920

Looking for a different module?

Module delivery information

Location Term Level1 Credits (ECTS)2 Current Convenor3 2024 to 2025
Canterbury
Spring Term 7 15 (7.5) Budi Arief checkmark-circle

Overview

A synopsis of the curriculum
• Network security and cybercrime.
• Analysis of real world network security incident (IoT botnet).
• Email security issues (spam and phishing attacks; spam filtering systems).
• Spyware (system vulnerabilities; stealth techniques; detection and removal).
• Network-related data security (data breaches; data loss prevention; remote sniffer detection).
• Security of WiFi networks.
• IoT network security
• Network forensics and incident response.
• Emerging network protocols
• IPv6 security.
• Honeypots and honeynets.
• Software-defined networking
• Penetration testing.

Details

Contact hours

Total contact hours: 20
Private study hours: 130
Total study hours: 150

Method of assessment

13.1 Main assessment methods
Coursework (50%)
Examination, 2-hour (50%)

13.2 Reassessment methods
Like for like.

Indicative reading

Christos Douligeris & Dimitrios Nikolaou Serpanos, "Network security: current status and future directions", John Wiley and Sons (2007).
Joseph Migga Kizza, "Guide to Computer network security", 4th ed., Springer (2017).
NIST SP800-61 r2, “Computer Security Incident Handling Guide” (2012), https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
Sherri Davidoff and Jonathan Ham, “Network Forensics: Tracking Hackers Through Cyberspace”, Prentice Hall (2012).
Michael Bazzell, “Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information”, 7th ed (2019).
Enisa, “Introduction to Network Forensics” (2019), https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf
William Stallings, “Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud”, Addison Wesley (2016).

See the library reading list for this module (Canterbury)

Learning outcomes

The intended subject specific learning outcomes.
On successfully completing the module students will be able to:
1 Have a knowledge of the threats faced by computer operating systems, applications and networks that originate from network-based attacks, intrusion and misuse;
2 Have a knowledge of the types of countermeasures that can be put in place in computer systems, networks, and network infrastructures to identify, reduce or prevent problems caused by network attacks or misuse;
3 Be capable of making informed choices of the appropriate countermeasures that should be put in place to protect systems from network attacks or misuse and to maintain network security;
4 Have a deeper and integrated understanding of selected key topics at the forefront of this field, including recent developments and outstanding issues;
5 Have the skills to keep abreast of future developments in network security;
6 Be able to undertake an investigation into areas covered by this module and report on their findings.

The intended generic learning outcomes.
On successfully completing the module students will be able to:
1 Manage time and resources within a potentially complex problem domain.;
2 Enhance their communication skills;
3 Have comprehensive understanding of methods and techniques that they have learned to solve problems;
4 Become lifelong learner, who can set goals and identify resources for the purpose of learning.

Notes

  1. Credit level 7. Undergraduate or postgraduate masters level module.
  2. ECTS credits are recognised throughout the EU and allow you to transfer credit easily from one university to another.
  3. The named convenor is the convenor for the current academic session.
Back to top

University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.