module specification

CC6004 - Network and Cloud Security (2017/18)

Module specification Module approved to run in 2017/18
Module title Network and Cloud Security
Module level Honours (06)
Credit rating for module 30
School School of Computing and Digital Media
Total study hours 300
81 hours Scheduled learning & teaching activities
219 hours Guided independent study
Assessment components
Type Weighting Qualifying mark Description
Group Coursework 30%   CW1 Group Coursework with online submission
Coursework 30%   CW2 online submission
Unseen Examination 40%   Exam
Running in 2017/18
Period Campus Day Time Module Leader
Year North Wednesday Morning

Module summary

The aim of this module is to provide students with a critical understanding of security threats against network and cloud computing systems and the security measures designed to protect such systems. The module will explicitly develop students’ knowledge and experience in the design and application of network and cloud security solutions. The module will also equips students for further academic study and future employability in the area of computer security. 

Prior learning requirements

Successful completion of level 5 or equivalent

Module aims

The aim of the module is for students to develop a critical understanding of the principles and technologies employed in the protection of computers and their
networked communications systems from security threats.


• Elements of applied cryptography
• Information security concepts
• Securing the network.
• Network security applications:

  • Authentication applications
  • IP security
  • Web security
  • E-Mail security

Systems security

  • Intruders
  • Malicious software
  • Firewalls
  • Strategies of developing and maintaining a network security

• Cloud computing fundamentals
• Cloud computing architecture
• Cloud computing software security
• Risk issues of cloud computing
• Cloud computing security architecture

Learning and teaching

Students will develop theoretical understanding and practical programming skills based on weekly lectures, tutorials and supervised workshops.  The workshops, in particular, are provided to support students in gaining practical experience in developing applications.

Appropriate blended learning approaches and technologies, such as, the University’s VLE and computer forensic tools, will be used to facilitate and support student learning, in particular, to:

  • deliver content;
  • encourage active learning;
  • provide formative and summative assessments, and prompt feedback; 
  • enhance student engagement and learning experience.

Students will be expected and encouraged to produce reflective commentaries on the learning activities and tasks that they carry out to complete their work.

Learning outcomes

On completing the module the students will be able to

LO1. understand the security risks associated with computer networks generally and within cloud computing environments specifically;
LO2. explain and demonstrate the role of network security protocols and policies;
LO3. demonstrate a critical understanding of commonly employed network security measures;
LO4. describe and analyse authentication mechanisms and security modelling techniques;
LO5. apply appropriate network security measures to particular scenarios;
LO6. understand the fundamentals of network and cloud computing security with specific reference to Legal, Social, Professional, and Ethical Issues (LSPEI);
LO7. critically evaluate and reflect on their learning, development, and achievements within the context of the subject.

Assessment strategy

The assessment consists of unseen examination and 2 courseworks. One of the courseworsk assesses network security, the other one on cloud security.


1. Bishop, M. (2005), Introduction to Computer Security, Addison Wesley, ISBN 0-321-24744-2

2. Krutz, R.L. (2010), Cloud Security A Comprehensive Guide to Secure Cloud Computing, Wiley, ISBN 978-0-470-58987-8

3. Comer, D.E. (2006), Internetworking with TCP/IP, Vol.1: principles, protocols and architectures, Prentice-Hall, 5th edition, ISBN 0-13-187671-6

4. Gollmann, D.(2006), Computer Security, Second Edition, John Wiley & Sons Ltd, ISBN 0470862939

5. Pfleeger, C.P. and Pfleeger, L.P. (2007), Security in Computing, Prentice Hall, ISBN-10: 0132390779

6. Stallings, W. (2011), Network Security Essentials: Applications and Standards, 4/e, Pearson Higher Education, ISBN-10: 0137067925 (the main textbook)