Language:EN
Pages: 12
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
network models and protocol architecture addresses

Network models and protocol architecture addresses

Course Description (Higher Education)

Title: NETWORKING AND SECURITY

AQF Level of Program
5 6 7 8 9 10

Introductory

Intermediate

This course will introduce the fundamentals of networking through analysis of the Open System Interconnection (OSI) and Internet networking models. Students will learn the role of each model layer and the technologies used to provide end-to-end connectivity between computer systems and the associated networking protocols. The course will also introduce cloud computing and investigate the role of cyber security in securing information systems. The role of personnel and encryption to secure Internet communications will also be studied.

Grade Scheme: Graded (HD, D, C, etc.)
Placement Component: No

1 /12

Course Description (Higher Education)

ITECH1102 NETWORKING AND SECURITY

Type Day Time Room Staff / Comment
3:30 pm - 5:30 pm S102

Abdul Matin

Laboratory 1

5:30 pm - 7:30 pm S203
5:30 pm - 7:30 pm S307

Syed Imtiaz Hussain

Laboratory 3

9:00 am - 11:00 am S204
5:30 pm - 7:30 pm S204

Iwan Adhicandra

Additional consultation time can be booked by contacting the staff member concerned directly.

K2. Describe and explain the principles of communication in networks.

K3. Describe the role and functionality of hardware and software entities that contribute to network

Skills:

ITECH1102 NETWORKING AND SECURITY

Application of knowledge and skills:

Values and Graduate Attributes:

Values:

FedUni graduate attributes statement. To have graduates with knowledge, skills and competence that

enable them to stand out as critical, creative and enquiring learners who are capable, flexible and work

Attribute Brief Description Focus
Medium

Students will participate in a self-directed learning to develop their theoretical and technical expertise in the field of networking and information security.

Medium

Capable, flexible and work ready

Medium
Medium

Scope:

Topics may include:

Course Description (Higher Education)

ITECH1102 NETWORKING AND SECURITY

Transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport layer functions, reliable and unreliable services, ports, linking to the application layer, segmentation, session management.

Introduction to Local Area Networks (LAN), LAN components, Ethernet and Token Ring, LAN design consideration, Wireless LAN, Wide Area Networks (WAN).

Cryptography and other network security technologies.

Planning and Implementing a Corporate Security Policy.

Week(s) Topic(s)
1-2
Week(s) Topic(s)
3- 7
7 lab
8

Students will sit a Theory test during the week 8 lecture timeslot.

The theory test will examine understanding of the Internet Model of networking. Questions will be similar in format to questions students may encounter on the end of semester examination and hence will help prepare students for the examination. The theory test is self-assessed and answers will be discussed by the lecturer during subsequent lecture sessions.

9
10 - 11
12

The following tasks will be graded.

Task Released Due

Weighting

Type
Week 2 Fri, Dec 14, 2018 - 17:00 (Week 5) 6.0% A
Week 5 In timetabled laboratory (Week 11) 9.0% A
Week 2 Fri, Jan 25, 2019 - 17:00 (Week 10) 15.0% A
Week 7 In timetabled laboratory (Week 7) 10.0% B

Examination

Exam period End of exam 60.0% B

Laboratory Tasks (throughout the semester): Students are required to complete set computing, networking and security tasks during laboratory sessions. Upon completing the tasks, students get marks allocated for those tasks. The tasks are designed to help students understand the material covered in lectures by interaction with computing systems. These tasks relate to learning outcomes K1, K4, K5, K6, S1, S2, S3, A1, A2, A3 & A4.

ITECH1102 NETWORKING AND SECURITY

and laboratory material covered in topics 1 - 8. Students must analyse the lecture material, reflect upon it, solve any given problem, research associated concepts and technologies and write a coherent analysis of the material. This assessment task will help students to understand the content delivered during weeks 1 to 9 and should, therefore, help students to perform well in associated assessment tasks. Students are also allowed to bring five (5) A4 sides of their ePortfolio into the laboratory test as resource material. These tasks relate to learning outcomes K1, K2, K3, K4, K6 and A1.

Learning Activity Description Hours

Attend lectures and laboratories.

Attend weekly lectures and laboratory classes.

48
18
15

Preparation for the self assessed Theory Test.

This task will test understanding of all
material covered in lectures and laboratories to the end of Topic 7.

15

Course Description (Higher Education)

ITECH1102 NETWORKING AND SECURITY

Learning Activity Description Hours
24

Review all material from the lectures and labs from the entire semesters work. Use the Examination study guide to help direct your study to strong understanding of all
ITECH1102 topics.

The examination covers all material
presented throughout the semester and as such students should ensure they fully
comprehend the theory and associated practical aspects of all topics covered.

30
Total: 150

Assessment Criteria:

In order to receive a passing grade in this Course, students must receive a passing mark in the invigilated (Type B) assessment tasks and an overall passing mark in the combined result of all (Type A and Type B) assessment tasks. Additionally, students who are determined to be 'at risk' may be subject to extra requirements such as minimum attendance. Failure to satisfy these extra requirements may result in an automatic fail in the course.

Late Assignment:

For all assessment items handed in after the official due date without an agreed extension, a 10% penalty will be applied to the total mark for each day (or part thereof) late after the due date (including weekends and public holidays).

Special Consideration:

If students are adversely affected by life circumstances a discretionary assessment extension of up to five University working days for one assessment task may be granted at the discretion of the tutor, lecturer, or course coordinator (dependent on faculty process) upon a direct request by the student via the Discretionary Assessment Extension form.

a c c e s s t o t h e p o l i c y , p r o c e d u r e s o r a s s o c i a t e d f o r m s ,

To be eligible to sit for the examination a student must have undertaken and submitted at least one prior assessment task (worth more than 10%) for this Course.

Available Grades:

Supplementary information concerning teaching, learning, and assessment may be provided from time to time in response to unforeseen circumstances. This may include changes in times or location of classes,

range of educational policies, procedures and guidelines, which you can find at

Student Support:

The University provides many different kinds of services to help you gain the most from your studies. You

Materials:

General:

Textbooks:

NIL.

9 /12

Course Description (Higher Education) ITECH1102 NETWORKING AND SECURITY

Bezencon, Hahnen, Pavlovic, Grubbs & Jenkins. Linux Lite - Help Manual. Retrieved 15/2/2017, from
Nathan Haines. Nathan Haines. (2015). Beginning Ubuntu for Windows and Mac users (Online resource through Library catalogue). Apress. . Retrieved . from
Note that some material in lectures, assignments and other resources provided to students may contain direct quotations from the text book(s) and references listed.

Course Description (Higher Education)

ITECH1102 NETWORKING AND SECURITY

Assessed Level

1.1 Information strategy

1.2.1 Consultancy

Yes 1

1.2.2 Technical specialism

Yes 1

3.1.4 Network design

Yes 1

3.1.11 Testing

No 1

4.4.1 System software

No 1

4.4.2 Security administration

Yes 1
Yes 1
11 /12

Australian Computer Society - Core Body of Knowledge: 2016 accreditation

Assessed Level
No Knowledge

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Nathan Mclaughlin

PageId: DOC9E635FE