Core Module Information
Module title: Network Security and Cryptography

SCQF level: 09:
SCQF credit value: 20.00
ECTS credit value: 10

Module code: CSN09412
Module leader: Jawad Ahmad
School School of Computing, Engineering and the Built Environment
Subject area group: Cyber Security and Systems Engineering

Networking-related module or module in the software

Description of module content:

The aim of the module is to develop a deep understanding of network security and cryptography, that will allow graduates to act professionally in the design, analysis, implementation, and reporting related to network security. An outline of the main areas includes:- Network Architectures and Network Device Configuration. Robust, scalable and secure architectures. Firewalls/IDS/IPS/Log/DMZ Configuration. Hosts and services within a network architecture. - Security Data Analysis, Processing and Learning: Network Protocols/Forensics. Log analysis. IDS/Snort. Splunk. - Encryption. Encoding. Secret Codes/Ciphers. Prime Numbers, Weaknesses, Public/private key. Encryption modes. Coverage of standard methods: RSA, AES, and so on. - Key exchange methods. Diffie-Hellman. - Hashing methods. Including MD5, SHA-1, and so on. Adding Salt. Collisions, One-time passwords. Cracking methods (Brute force, rainbow methods, parallel processing). - Authentication methods. Authentication methods, Digital Certificates.

Learning Outcomes for module:

Upon completion of this module you will be able to:
LO1: Understand the operation and implementation of cryptographic methods, related to
traditional ciphers, symmetric key encryption, hashing methods and public-key
LO2: Understand the operation of key networking protocols and how they can be used to
find and detect intrusions.
LO3: Review current literature on intrusion detection systems, and design and analyse a
security system based network traffic and system logs.

Full Details of Teaching and Assessment
2022/3, Trimester 3, FACE-TO-FACE,
Occurrence: 001
Primary mode of delivery: FACE-TO-FACE
Location of delivery: MERCHISTON
Member of staff responsible for delivering module: Jawad Ahmad
Module Organiser:

Learning, Teaching and Assessment (LTA) Approach:
• The module will use an advanced cloud infrastructure which virtualises hosts and devices, and allows complex network architectures to be created [LO1 and LO2].
• The Asecuritysite Web package contains a completely managed learning environment, where the students can track their performance [LO1 and LO2].

Embedding of employability/PDP/Scholarship Skills
The module uses industry-standard methods, protocols, equipment and software

Formative Assessment:
The coursework will involve the design, implementation, evaluation and critical analysis of a system to a given set of security requirements for an intrusion detection system [LO2 and LO3].

Summative Assessment:
There will be two methods of assessment:

• Coursework [50%]. This relates to a coursework on the design, implementation, evaluation and critical analysis of a prototype of a security infrastructure system, based on a range of requirements for an intrusion detection system [LO2 and LO3].
• On-line test [50%]: This involves one on-line test which cover the key areas of network security and cryptography [LO1 and LO2].

Student Activity (Notional Equivalent Study Hours (NESH))
Mode of activityLearning & Teaching ActivityNESH (Study Hours)
Face To Face Lecture 24
Face To Face Practical classes and workshops 24
Independent Learning Guided independent study 152
Total Study Hours200
Expected Total Study Hours for Module200

Type of Assessment Weighting % LOs covered Week due Length in Hours/Words
Class Test 50 1,2 9 HOURS= 01.00
Project - Written 50 2,3 14/15 HOURS= 50.00
Component 1 subtotal: 100
Component 2 subtotal: 0
Module subtotal: 100

Indicative References and Reading List - URL:
Contact your module leader