Registry

Module Specifications

Current Academic Year 2012 - 2013
Please note that this information is subject to change.

Module Title
Module Code
School
Online Module Resources

Module Co-ordinatorSemester 1: Darragh O'Brien
Semester 2: Darragh O'Brien
Autumn: Darragh O'Brien
NFQ level 9 Credit Rating
Pre-requisite None
Co-requisite None
Compatibles None
Incompatibles None
Description
The aim of the course is to introduce the student to the issues that arise when we consider the security of computer networks, from both a "white-hat" (defensive), and "black-hat" (offensive) perspective.

Learning Outcomes
1. Evaluate the threats that exist against computer networks
2. Deploy cryptography to offer a strong defence
3. Advise those concerned with their network security on correct measures
4. Assess the top threats to web application security and counter them
5. Evaluate the security of web applications
6. Assess the implications of current IP versions



Workload Full-time hours per semester
Type Hours Description
Lecture36Classroom lectures
Laboratory12Lab exercises
Independent learning140Independent learning
Total Workload: 188

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml

Indicative Content and Learning Activities
Indicative syllabus.
Packet filtering. Firewalls. Security policy. Virtual Private Networks. Distributed Denial of Service (DDoS) attacks and defences. Tracing an attack. Case studies. Inside an Internet worm. Attacks via email. Securing email via PGP and IBE. Eavesdropping attacks on switched networks using ARP redirection. RIP spoofing attacks. Port scanners and network sniffers. Backdoors and Trojans. Obtaining administrator privileges. The Honeynet Project. Setting up a honeynet and analysing its logs. Cryptography and its limitations. OpenSSL. The WEP crack. SNMP and network security management..

Assessment Breakdown
Continuous Assessment% Examination Weight%
Course Work Breakdown
TypeDescription% of totalAssessment Date
Practical/skills evaluationLab-based programming and reporting25%Week 8
Reassessment Requirement
Resit arrangements are explained by the following categories;
1 = A resit is available for all components of the module
2 = No resit is available for 100% continuous assessment module
3 = No resit is available for the continuous assessment component
This module is category
Indicative Reading List
  • Bruce Schneier: 2004, Secrets and lies, Wiley, Indianapolis, Ind., 0-471-45380-3
  • Joel Scambray, Stuart McClure, George Kurtz: 2001, Hacking exposed, Osborne/McGraw-Hill, Berkeley, Calif., 978-0072127485
  • Cyrus Peikari, Seth Fogie: 2003, Maximum wireless security, Sams, Indianapolis, Ind., 978-0672324888
  • Stephen Northcutt: 2003, Inside network perimeter security, New Riders, Indianapolis, Ind., 978-0735712324
  • William Stallings: 2003, Network security essentials, Pearson Education, Upper Saddle River, NJ, 978-0130351289
Other Resources
None
Array
Programme or List of Programmes
Timetable this semester: Timetable for
Archives: