networking

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
networking [2024/09/03 13:54] – [Module UFCFDU-30-1 Level 4 30 credits] samuelnetworking [2025/02/10 15:36] (current) dan
Line 6: Line 6:
  
 {{:cyberdegree:networking.pdf|Module specification}} {{:cyberdegree:networking.pdf|Module specification}}
- 
  
 ==== Overview ==== ==== Overview ====
  
-The aim of this unit is to provide apprentices with knowledge of computer networking essentials, how they operate, protocols, standards, security considerations and a range of networking technologies. +The aim of this unit is to provide apprentices with knowledge of computer networking essentials, how they operate, protocols, standards, security considerations and a range of networking technologies.
  
-It gives the apprentices the knowledge and skills that they need for the planning, designing, implementation and management of computer networks and understanding of the network infrastructure capabilities and limitations. +It gives the apprentices the knowledge and skills that they need for the planning, designing, implementation and management of computer networks and understanding of the network infrastructure capabilities and limitations.
  
 You will cover: You will cover:
  
- +  * network foundations, connections, internetworking, protocols, standards, performance, security and server virtualisation 
-  *network foundations, connections, internetworking, protocols, standards, performance, security and server virtualisation  +  * fundamental building blocks (e.g. routers, switches, hubs, storage, transmission) and typical architectures (e.g. server/client, hub/spoke) of computer networks and the Internet 
-  *fundamental building blocks (e.g. routers, switches, hubs, storage, transmission) and typical architectures (e.g. server/client, hub/spoke) of computer networks and the Internet  +  * data and protocols and how they relate to each other 
-  *data and protocols and how they relate to each other  +  * data formats and simple protocols in current use 
-  *data formats and simple protocols in current use  +  * failure modes in protocols 
-  *failure modes in protocols  +  * error control 
-  *error control  +  * network protocols in widespread use on the Internet and their purpose and relationship to each other, including the physical and data link layer – e.g., HTTP, SMTP, SNMP, TCP/IP, BGP, DNS, etc 
-  *network protocols in widespread use on the Internet and their purpose and relationship to each other, including the physical and data link layer – e.g., HTTP, SMTP, SNMP, TCP/IP, BGP, DNS, etc  +  * network performance 
-  *network performance  +  * virtualisation techniques 
-  *virtualisation techniques  +  * network monitoring and mapping 
-  *network monitoring and mapping  +  * static and dynamic routing protocols 
-  *static and dynamic routing protocols  +  * wireless network security 
-  *wireless network security +  * common types of security hardware and software which are used to protect systems e.g., firewalls, encryption for data at rest, encryption for communication, intrusion detection systems (IDS), intrusion protection systems (IPS), identity and access management (IDAM) tools, anti-virus, web proxy, application firewalls, cross domain components, hardware security module (HSM), trusted platform module (TPM), unified threat module (UTM) 
-  *common types of security hardware and software which are used to protect systems e.g., firewalls, encryption for data at rest, encryption for communication, intrusion detection systems (IDS), intrusion protection systems (IPS), identity and access management (IDAM) tools, anti-virus, web proxy, application firewalls, cross domain components, hardware security module (HSM), trusted platform module (TPM), unified threat module (UTM)  +  * how these may be used to deliver risk mitigation or implement a security case 
-  *how these may be used to deliver risk mitigation or implement a security case  +      * benefits/limitations 
-    *benefits/limitations  +      * considering the implicit assurance (including supplier assurance and considering the benefits and risks of open source options) of the component 
-    *considering the implicit assurance (including supplier assurance and considering the benefits and risks of open source options) of the component  +      * residual risks
-    *residual risks+
  
 === Delivery === === Delivery ===
  
 All resources can be found on blackboard. All resources can be found on blackboard.
 +
 ==== Assignment Brief ==== ==== Assignment Brief ====
  
Line 44: Line 43:
 === Component A Presentation (30 minutes) === === Component A Presentation (30 minutes) ===
  
-Issued: End of block release week 2+Issued: Start of block release week 1
  
-Due: Start of block release week 3+Due: A week after block release week 2
  
 Apprentices will be given a design requirement (including security) for a network along with an implementation. In the presentation they will: Apprentices will be given a design requirement (including security) for a network along with an implementation. In the presentation they will:
-   *Explain how the given implementation and components function + 
-   *Explain how the given implementation meets, or does meet, the design requirement  +  * Explain how the given implementation and components function 
-   *Propose changes to the given implementation to take account of scalability +  * Explain how the given implementation meets, or does meet, the design requirement 
 +  * Propose changes to the given implementation to take account of scalability
  
 === Component B Practical Report (3,000 words) === === Component B Practical Report (3,000 words) ===
  
-Issued: End of block release week 3+Issued: Start of block release week 3
  
 Due: Start of block release week 1 of next module Due: Start of block release week 1 of next module
  
-Apprentices will build a network to a given specification. They will write a report detailing the selection of components, system configuration, optimisation, testing and troubleshooting. A conclusion will be required stating how well the implementation met the requirements.  +Apprentices will build a network to a given specification. They will write a report detailing the selection of components, system configuration, optimisation, testing and troubleshooting. A conclusion will be required stating how well the implementation met the requirements.
  
 ==== Submission details ==== ==== Submission details ====
  
-All assignments will be submitted and feedback given on the UWE Blackboard system +All assignments will be submitted and feedback given on the UWE Blackboard system
  
 ==== Reading list (link to UWE library) ==== ==== Reading list (link to UWE library) ====
Line 72: Line 71:
 ==== Communication ==== ==== Communication ====
  
-All questions about this module should be directed to the module leader. +All questions about this module should be directed to the module leader.
  
 Please contact via email, which is monitored continuously Please contact via email, which is monitored continuously
- 
  
  
  • networking.txt
  • Last modified: 2025/02/10 15:36
  • by dan