Show/hide contentOpenClose All
Curricular information is subject to change
Upon successful completion of this module students should be able to:
- Describe the technologies used in creating and using a wireless network
- Explain the operation of various wireless security protocols
- Compare and contrast the relative strengths of said security protocols
- Gather information on wireless networks using both passive and active means
- Explain the technology on which Voice over IP is reliant
- Describe the potential sources of evidence available in VoIP clients and
interceptions.
- Analyse artifacts associated with common VoIP clients.
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Practical | 20 |
Autonomous Student Learning | 156 |
Total | 200 |
Not applicable to this module.
Resit In | Terminal Exam |
---|---|
Summer | Yes - 2 Hour |
• Feedback individually to students, post-assessment
Not yet recorded.