Show/hide contentOpenClose All
Curricular information is subject to change
Upon successful completion of this module students should be able to:
- Describe the technologies used in creating and using a wireless network
- Explain the operation of various wireless security protocols
- Compare and contrast the relative strengths of said security protocols
- Gather information on wireless networks using both passive and active means
- Explain the technology on which Voice over IP is reliant
- Describe the potential sources of evidence available in VoIP clients and
interceptions.
- Analyse artifacts associated with common VoIP clients.
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Practical | 20 |
Autonomous Student Learning | 156 |
Total | 200 |
Not applicable to this module.
Description | Timing | Component Scale | % of Final Grade | ||
---|---|---|---|---|---|
Continuous Assessment: Continuous Assessment | Varies over the Trimester | n/a | Graded | Yes | 100 |
Remediation Type | Remediation Timing |
---|---|
In-Module Resit | Prior to relevant Programme Exam Board |
• Feedback individually to students, post-assessment
Not yet recorded.