1 / 10

Network Security 6006COMP

Network Security 6006COMP. Kashif Kifayat. Module Aims. To study Understand security threats and vulnerabilities to information, computing and communications systems. Assess critically a variety of generic security technologies for protection of computer networks.

lael
Download Presentation

Network Security 6006COMP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security 6006COMP Kashif Kifayat

  2. Module Aims • To study • Understand security threats and vulnerabilities to information, computing and communications systems. • Assess critically a variety of generic security technologies for protection of computer networks. • Develop practical skills in the use of security countermeasure technologies and associated tools.

  3. Learning and Assessment • Learning outcomes • Critically evaluate the threats and vulnerabilities to information, computing and communications systems. • Critically review use of security countermeasures in a computing environment. • Critically evaluate the use of information security management techniques. • Apply creative skills in the development of security software and cryptographic mechanisms and protocols to mitigate these threats and vulnerabilities.

  4. Learning and Assessment • Assessment for the course • Coursework 50% • Write a report to critically evaluate the threats and security countermeasures 30% • Tool development 20% • Examination 50%

  5. Module contentSemester 1

  6. Module contentSemester 2

  7. Module leader contact details

  8. Progress from previous years!

  9. Success at Cyber Security Challenge Pictured (left to right): LJMU’s Stephen Wilson with team members Jonathan Millican, Computer Science student from the University of Cambridge, Joseph Greenwood from the Department of Aerospace Engineering University of Bristol, Professional Pen Tester Lee Nichol, and Stephen Fleming who is undertaking a PhD Studentship in Electrical Engineering at the University of Cambridge.

More Related