Advanced Network Security - COMP8920

Looking for a different module?

Module delivery information

Location Term Level1 Credits (ECTS)2 Current Convenor3 2021 to 2022
Canterbury
Spring Term 7 15 (7.5) Budi Arief checkmark-circle

Overview

A synopsis of the curriculum
• Network security and cybercrime.
• Analysis of real world network security incident (IoT botnet).
• Email security issues (spam and phishing attacks; spam filtering systems).
• Spyware (system vulnerabilities; stealth techniques; detection and removal).
• Network-related data security (data breaches; data loss prevention; remote sniffer detection).
• Security of WiFi networks.
• Network forensics and incident response.
• Emerging network protocols
• IPv6 security.
• Honeypots and honeynets.
• Software-defined networking.

Details

Contact hours

Total contact hours: 20
Private study hours: 130
Total study hours: 150

Method of assessment

13.1 Main assessment methods
Two reports (25% total)
Examination, 2-hour (75%)

13.2 Reassessment methods
Like for like.

Indicative reading

Christos Douligeris & Dimitrios Nikolaou Serpanos, "Network security: current status and future directions", John Wiley and Sons (2007).
Joseph Migga Kizza, "Guide to Computer network security", 4th ed., Springer (2017).
NIST SP800-61 r2, “Computer Security Incident Handling Guide” (2012), https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
Sherri Davidoff and Jonathan Ham, “Network Forensics: Tracking Hackers Through Cyberspace”, Prentice Hall (2012).
Michael Bazzell, “Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information”, 7th ed (2019).
Enisa, “Introduction to Network Forensics” (2019), https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf
William Stallings, “Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud”, Addison Wesley (2016).

See the library reading list for this module (Canterbury)

Learning outcomes

The intended subject specific learning outcomes.
On successfully completing the module students will be able to:
1 Have a knowledge of the threats faced by computer operating systems, applications and networks that originate from network-based attacks, intrusion and misuse;
2 Have a knowledge of the types of countermeasures that can be put in place in computer systems, networks, and network infrastructures to identify, reduce or prevent problems caused by network attacks or misuse;
3 Be capable of making informed choices of the appropriate countermeasures that should be put in place to protect systems from network attacks or misuse and to maintain network security;
4 Have a deeper and integrated understanding of selected key topics at the forefront of this field, including recent developments and outstanding issues;
5 Have the skills to keep abreast of future developments in network security;
6 Be able to undertake an investigation into areas covered by this module and report on their findings.

The intended generic learning outcomes.
On successfully completing the module students will be able to:
1 Time management and organisation;
2 Communication skills;
3 Be able to undertake an independent investigation into areas covered by this module and report on their findings;
4 Problem solving;
5 Independent study and appropriate use of relevant resources.

Notes

  1. Credit level 7. Undergraduate or postgraduate masters level module.
  2. ECTS credits are recognised throughout the EU and allow you to transfer credit easily from one university to another.
  3. The named convenor is the convenor for the current academic session.
Back to top

University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.