Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Course Outline

COURSE CODE: CEI 55 COURSE TITLE: Network Security and Support

1. SEMESTER/YEAR: 1, 2020

2. MODE OF DELIVERY/LOCATION: Blended

3. PRE-REQUISITES: CEI44, CEI45 and any one of Level 4 courses

4. COURSE CO-ORDINATOR: Mr. Imtiaz Ali

5. TEACHING TEAM

Name: Moses Chandra Name: Shanje Shant Sushil


Office: 202 Statham, Laucala Campus Office: USP Labasa Campus, Level 2
Phone: (679) 32 31388 Phone: (679) 88 17707
Email: moses.chandra@usp.ac.fj Email: shanje.sushil@usp.ac.fj
Consultation Hours: Open Door Consultation Hours: Fridays 8am to 4pm
Name: Krishneel Maharaj Name: Nia Nakala
Office: USP Lautoka Campus, Level 2 Office: USP Tuvalu Campus
Phone: (679) 88 17707 Phone: (688) 20334
Email: krishneel.maharaj@usp.ac.fj Email: moses.chandra@usp.ac.fj
Consultation Hours: Fridays 8am to 4pm Consultation Hours: Mon/Wed/Fri 5pm to
9pm
Name: Moses Chandra Name: Melvin Prasad
Office: 202 Statham, Laucala Campus Office: 202 Statham, Laucala Campus
Phone: (679) 32 31388 Phone: (679) 32 31388
Email: moses.chandra@usp.ac.fj Email: melvin.prasad@usp.ac.fj
Consultation Hours: Consultation Hours: Open Door

6. LECTURE TIMES & VENUE

All lecture times will be uploaded to Moodle and will be available to students once registered for this
unit.

CEI - 55 Page 1
7. EMERGENCY CONTACT

Name: Mr. Imtiaz Ali


Phone: (679) 32 31388
Email: imtiaz.ali@usp.ac.fj

8. COURSE DESCRIPTION

This course addresses the knowledge, processes and techniques necessary to develop approaches to
sustainability within workplaces, including the development and implementation of policy. It applies
to managers working in a range of contexts who approach and addresses compliance with relevant
legislative requirements. Moreover, this course describes the skills and knowledge required to
implement , manage security functions throughout a network and the skills and knowledge required
to build a high performance, high security, failure resistant security perimeter, for an enterprise
information and communications technology (ICT) network.

9. COURSE LEARNING OUTCOMES

On successful completion of this course, students should be able to:


1. Develop workplace policy and procedures for sustainability.
2. Ensure a safe workplace.
3. Design and implement a security perimeter for ICT networks Design and implement a security
perimeter for ICT network.
4. Design and implement a security perimeter for ICT networks.

10. USP GRADUATE OUTCOMES

The USP graduate outcomes are as follows:

1. Communication: Graduates will be able to communicate ideas clearly and persuasively in


structured formats using language and other modes of communication that are appropriate
for context, audience and specific disciplinary conventions.
2. Creativity: Graduates will extend boundaries of current knowledge in a particular discipline or
profession.
3. Critical thinking and quantitative reasoning: Graduates will be able to evaluate multiple
perspectives and arrive at a reasonable independent judgement based on evidence.
4. Ethics: Graduates will demonstrate a commitment to high ethical standards in scholarly,
professional and socio-cultural practices.
5. Pacific consciousness: Graduates will recognize the cultural heritage and diversity of Pacific
societies for sustainable development in a contemporary environment.
6. Professionalism: Graduates will demonstrate the ability to carry out tasks to acceptable
standards within their profession and occupations.
7. Teamwork: Graduates will work together in a respectful and collaborative manner to
complete tasks within teams to achieve an outcome.

CEI - 55 Page 2
11. COURSE CONTENT

Focus for Each Week


1 Introduction and Overview
2
Develop workplace policy and procedures for
3
sustainability
4
5
6 Ensure a safe workplace
7
8
Design and implement a security perimeter for ICT
9
networks Design and implement a security perimeter for
10
ICT network
11
12
13
Design and implement a security perimeter for ICT
14
networks
15
16
17 Course Review – All assessments are due

12. PRESCRIBED TEXT AND OTHER RESOURCES


 Guide to Network Security
2013c ISBN: 9780840024220 Edition 1
Published: 2012 by Cengage Learning US
Author/s: Michael E. Whitman

 Security+ Guide to Network Security Fundamentals


2012c ISBN: 9781111640125 Edition 4
Published: 2011 by Cengage Learning US
Author/s: Mark Ciampa / Western Kentucky University

CEI - 55 Page 3
13. ALIGNMENT OF LEARNING OUTCOMES, ACTIVITIES AND ASSESSMENT

The following table demonstrates the alignment of the course learning outcomes to appropriate
activities and assessments and the links to programme and USP graduate outcomes.

Course Learning Associated Assessment Programme USP Graduate


Outcome Teaching and Outcomes Outcomes
Learning
Activities

Develop workplace Develop Assignment 1 – 10% Develop workplace 1,2,3,4,5,6 and 7


workplace policy and
policy and sustainability Tutorial 1 – 10% procedure for
procedures for policy sustainability and
sustainability ensuring a safe
Communicate workplace
workplace
sustainability
policy
Implement
workplace
sustainability
policy
Review workplace
sustainability
policy
implementation
Ensure a safe Establish and Lab – 10% Develop workplace 1,2,3,4,5,6 and 7
workplace maintain a WHS policy and
management Short Test 1 – 10% procedure for
system sustainability and
Moodle Forum – ensuring a safe
Establish and 5% workplace
maintain effective
and compliant
participation
arrangements for
managing WHS
Establish and
maintain
procedures for
effectively
identifying
hazards, and
assessing and
controlling risks
Evaluate and
maintain a WHS
management
system
Design and Plan and design Assignment 2 – 10% Design and 1,2,3,4,5,6 and 7
implement a firewall solution implement a
security perimeter Tutorial 2 – 10% network security
for ICT networks Configure perimeter for CT
Design and perimeter to networks
implement a secure network
security perimeter
for ICT networks Plan, design and
configure network
devices to provide
secure fall over
and redundancy

CEI - 55 Page 4
Plan, design and
configure a VPN
solution
Test and verify
design
performance
Design and Define a process Presentation – 10% Design and
implement a for designing implement a
security perimeter security Short Test 2 – 10% network security
for ICT networks perimeter for CT
Identify threats to Assignment 3 – 15% networks
network security
Analyze security
risks
Create a security
design
Design and
implement
responses to
security incidents

14. ASSESSMENT

14.1 ASSESSMENT PORTFOLIO

TYPE OF ASSESSMENT WEIGHT Comments/Rationale LEARNING


OUTCOME
Assessment 1: Short Tests 20%
Assessment 2: Assignments 20%
Assessment 3: Tutorials 20%
Assessment 4: Labs 10%
1,2,3 and 4
Assessment 5: Project 15%
Assessment 6: Presentation 10%
Assessment 7: Moodle Forum
5%
and Quiz

14.2 PASSING THE UNIT

In order to be awarded a pass in this unit, students must:


 Attempt all short tests
 Partake in the final presentation (for region students – contact facilitators to make
arrangements for the presentation)

14.3 GRADE DISTRIBUTION

A+ A B+ B C+ C D E
85-100 78-84 71-77 64-70 57-63 50-56 40-49 0-39

CEI - 55 Page 5
14.4 ASSESSMENT POLICIES AND REGULATIONS

For detailed regulations, please refer to the USP Handbook and Calendar.

Plagiarism, copying materials from other sources without proper referencing and acknowledge of
the source is a serious offence and will be dealt with severely. In the Regulations Governing
Academic Misconduct section of the USP Handbook & Calendar plagiarism is defined as “the
copying of another person’s creative work and using it as one’s own – without explicitly giving
credit to the original creator. Work copied without acknowledgement from a book, from another
student’s work, from the internet or from any other source”. If lecturer is satisfied that plagiarism
has occurred, they will report the matter to the Head of School. They can reduce marks
appropriately. If the matter is seen as serious enough it can be taken to the Student Disciplinary
Committee by the Head of School.

15. IMPORTANT DATES

Activity Week Weighting (%)


Assignment 1 2-3 10%
Tutorial 1 2-3 10%
Lab 4-7 10%
Short Test 1 4-7 10%
Assignment 2 8-11 10%
Tutorial 2 8-11 10%
Presentation 12-16 10%
Short Test 2 12-16 10%
Assignment 3 12-16 15%
Moodle
Participation 1-17 5%

16. ADDITIONAL COURSE ATTENDANCE

16.1 TUTORIALS
All tutorial session, date and time will be announced via Moodle prior to the commencement of the
course.

16.2 LABORATORY SESSIONS


There is only 1 lab in this unit. The date and time of these will be announce via Moodle as the course
progresses during the semester.

16.3 ONLINE WORK


Students are encouraged to participate in the various Moodle Discussion Forum posts. These forums
are aimed at recollecting the week’s activities and also act as a tools for student who wish to have
open discussions on topics covered during the course.

CEI - 55 Page 6
17. STUDENT SUPPORT

17.1 ONLINE HELP & e-Learning INFORMATION


(if applicable, insert details)

17.2 FACULTY STUDENT LEARNING SUPPORT (SLS) SERVICES


(if applicable, insert details)

18. EXPECTATIONS OF STUDENTS

18.1 STUDENT RESPONSIBILITIES


Students are expected to:
 Spend enough time on Moodle and other activities required in the course
 Attend all lectures, workshops, team meetings etc. unless hampered by illness in which case
you must inform your course coordinator and team members.
 Arrange with the team members to work in their own times on the project.
 Maintain proper attire for the laboratory, clothing, shoes etc.
 Facilitate the course coordinator with any proof that he/she was sick and unable to attend
classes or assessment at the earliest possible time to avoid getting a zero mark for the missed
assessment.

18.2 STUDENT WORKLOAD

TYPE Hours Comments


F2F Support Tutorial 45
Quizzes and Assignments 10
Labs 10
Short Tests 10
Discussion: Moodle, etc 15
Library Research 5
Presentation 5
TOTAL 100

CEI - 55 Page 7

You might also like