Programme/Approved Electives for 2025/26
None
Available as a Free Standing Elective
No
Linked with current industry certification requirements e.g. ISC2, this module will build your proficiency in the theory and application of cryptography and network security. After an overview of the Cyber Threat Landscape and Basic Cyber Hygiene practices, you will master Symmetric and Asymmetric Cryptography, Cryptographic Protocols, and Key Management. You will also learn about Networks, Protocols and Architectures, and the role of Firewalls and Intrusion Detection Systems. You will then explore Malware and Attack Technologies and effective Incident Response techniques.
Aims
This module aims to enable students to:• understand the diverse types of cryptography and computer networks• understand principles and practices in communications and computer network technologies and deployments• comprehend fundamental security goals achieved through cryptographic algorithms and protocols• apply network security approaches• identify major attack techniques and characteristics against cryptography and networks, and countermeasures• outline emerging trends in cryptographic and network security applications, attacks, and defence approaches (including identifying properties that cryptographic algorithms can have to resist attacks, and for networks to be resilient from attacks)• identify, apply, analyse, and appraise different cryptographic solutions and network security approaches in the light of evolving security risks and state-of-the-art countermeasures• develop teamwork, critical analysis, and academic writing and communication skills
Intended Learning Outcomes
Explain and differentiate basic terminologies and fundamental concepts in cryptography and network security: 1Assess cryptographic algorithms and protocols to verify that they meet identified security criteria for effective resilience to attacks: 1,2Apply fundamental and widely researched cryptanalysis techniques to specific cipher types: 1,2Describe the theory and principles of technologies employed to enable data communications in modern computer networks: 1,2,3Create computer networks using real or virtualised approaches, recognising their limitations: 1,2Use applicable approaches to analyse and assess computing networks for threats, vulnerabilities, and potential impacts on network security incident scenarios in various application areas and sectors: 1,2,3Develop appropriate security controls and countermeasure configurations using appropriate tools and techniques for mitigating network security risks: 2Analyse write-ups on cryptography, network security management, and policy applications, and synthesise knowledge into summary insights: 1
Lectures: 36 hours [6 hours each per week]Practicals/Tutorials: 36 hours [6 hours each per week]Private Study: 102 hours Assessment Preparation: 126 hours (76 hours group work and 50 hours individual preparation)
Description of Module Assessment
1: Portfolio weighted 30%Individual Weekly Assignments TasksThe assessment involves completing 6 weekly individual tasks and submitting a short report (1500 words maximum in total) covering the learning from each week to build a portfolio of work.
2: Group Assessment weighted 60%Group-based Project & PresentationThe assessment involves students working in small groups of 4 to complete applied, scenario-based projects involving security analysis and the development of network security solutions. Each group will make a 30-minute, group-based presentation to describe and demonstrate the work done, lessons learned, and implication to practice (plus 15-minutes for Q and A), supported by a single team report (4000 words equivalent) that will outline the collective effort from the group and an indication of contribution levels. Students will be given a team mark. Individual marks will then be calculated based on the contribution levels outlined in the report. This will ensure the final marks reflects contribution levels.
3: Reflective Diary weighted 10%Individual reflectionThis assessment involves each student producing an individual report (1,000 word equiv.) explaining and reflecting on their role in the group project, their individual contribution and how they went about it, demonstrating their individual understanding of a range of topics covered in the module delivery.