The aim of the module is to develop a deep understanding of network security and cryptography, that will allow graduates to act professionally in the design, analysis, implementation, and reporting related to network security. An outline of the main areas includes: information security controls, Information Policy, Identity, Data exposure mitigation, Risk Management; Network Architectures and Network Device Configuration. Robust, scalable and secure architectures; Firewalls/IDS/IPS/Log/DMZ Configuration; Hosts, servers and services. Configuration of the range of hosts, services and servers used in network architectures, including covering related test/debug tools; Intrusion Detection Systems. Techniques, Snort, IDS Rules, Distributed/Agent-based, Signature/Anomaly detection, and IDS signature generation; Introduction to Network Protocols/Forensics; Secret Codes. Encoding, Substitution codes, key-based codes, secret sharing, and a wide range of methods; Encryption. Prime Numbers, Weaknesses, Public/private key, CBC/ECB. Coverage of methods: RSA, AES, and so on; Key exchange methods. Diffie-Hellman, El-Gamal, Kerberos, and so on; Hashing methods. Including MD5, SHA-1, and so on. Adding Salt. Collisions, One-time passwords; Authentication methods. Authentication methods, Digital Certificates; Data Integrity. Checksums, Message Authentication Codes (MACs), CRC-32, and other associated methods; Code cracking methods. Brute force, rainbow methods, parallel processing, Man-in-the-middle, known weaknesses.