Module Details

Module Code: SYST
Module Title: Systems Infrastructure and Security
Title: Systems Infrastructure and Security
Module Level:: 6
Credits:: 5
Module Coordinator: Nigel Whyte
Module Author:: Fiona Redmond
Domains:  
Module Description: To provide learners with the necessary skills to build and secure a computer system infrastructure.
 
Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Demonstrate theoretical and practical knowledge of securing a system infrastructure.
LO2 Implement automated protection and monitoring software across a system infrastructure.
LO3 Describe industry standard frameworks available to ensure system security.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is recommended before enrolment in this module.

No recommendations listed
Co-requisite Modules
No Co-requisite modules listed
Additional Requisite Information
No Co Requisites listed
 
Indicative Content
Computer Security
Review of CIA model, OS updates and package management, verifying checksums on downloaded packages.
Securing Systems
Securing against common vulnerabilities (e.g. XSS, DDoS, DNS Poisoning). Security keys and key management (e.g. SSH and PGP). Encryption and encryption tools e.g. VeraCrypt.
System Monitoring
Setup and configuration of automated monitoring software such as Nagios and Zabbix to monitor system processes, usage of system resources, and file systems. Examine Nikto for Web Servers.
Security Tools
Configuring firewalls, implementing honeypots and examining SIEM and IDS tools such as Snort, security scanning tools such as Nessus.
Mitre Attack Framework
Overall analysis and evaluation of the Mitre Attack Framework and implementation of sections where appropriate.
Module Content & Assessment
Assessment Breakdown%
Continuous Assessment10.00%
Project50.00%
End of Module Formal Examination40.00%

Assessments

Full Time

Continuous Assessment
Assessment Type Short Answer Questions % of Total Mark 10
Timing Week 5 Learning Outcomes 1
Non-marked No
Assessment Description
Diagnostic assessment
Project
Assessment Type Project % of Total Mark 50
Timing Week 10 Learning Outcomes 1,2
Non-marked No
Assessment Description
System security project
No Practical
End of Module Formal Examination
Assessment Type Formal Exam % of Total Mark 40
Timing End-of-Semester Learning Outcomes 1,3
Non-marked No
Assessment Description
End of semester exam
Reassessment Requirement
Repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.
Reassessment Description
Two Assessments:
Repeat Theory Exam (50%)
Repeat Coursework (50%)

SETU Carlow Campus reserves the right to alter the nature and timings of assessment

 

Module Workload

Workload: Full Time
Workload Type Workload Category Contact Type Workload Description Frequency Average Weekly Learner Workload Hours
Lecture Contact Lecture 12 Weeks per Stage 1.00 12
Laboratory Contact Laboratory 12 Weeks per Stage 3.00 36
Independent Learning Non Contact Independent Learning Hours 15 Weeks per Stage 5.13 77
Total Weekly Contact Hours 4.00
 
Module Resources
Recommended Book Resources
  • Chris Sanders. Intrusion Detection Honeypots: Detection through Deception, 1st Edition, Applied Network Defense, p.238, [ISBN: 978173518830].
  • Lee Brotherston and Amanda Berlin. Defensive Security Handbook: Best Practices for Securing Infrastructure, 1st Edition, O'Reilly Media, p.284, [ISBN: 97849196038].
  • Richard Bejtlich. The Practice of Network Security Monitoring: Understanding Incident Detection and Response, 1st Edition, No Starch Press, p.376, [ISBN: 978159327509].
This module does not have any article/paper resources
This module does not have any other resources
Discussion Note: