Expected learning outcomes
- The candidate possesses thorough knowledge of models and protocols in data communication networks.
- The candidate possesses thorough knowledge in the theory of network security.
- The candidate is capable of applying his/her knowledge in the field of IT-security.
- The candidate is capable of updating his/her own knowledge in data communication networks.
- The candidate is capable of performing basic network administration tasks.
- The candidate is capable of performing error tracking and solving in basic networks.
- The candidate knows relevant methods and terminology in the area of data communications.
- The candidate is capable of working independently and in groups in the field of data communication.
- The candidate is capable of designing, analyzing, and performing maintenance on basic networks.
After completion of the course, the students:
- Will have knowledge of the most used standards and protocols for data communication.
- Will understand the principles of network security.
- Basics of computer networks
- Application layer (HTTP, SMTP, DNS)
- Transport layer (TCP, UDP)
- Network layer (IP, ICMP, routing)
- IPv6 Network addressing
- Data link and physical layer (Ethernet, MAC, ARP, witching, VLANs)
- Basics of network security, including applied cryptography
- Authentication in networks (Kerberos)
- Network Intrusion Detection Systems
Form(s) of Assessment
Form(s) of Assessment (additional text)
The exam consists of three/(four optional) parts. These include the final exam of CCNA R&S Module 1 + 2, a written subnetting exercise, a router configuration part using Packet Tracer simulation software (optional) and a written exam of network security.
Part 1: - Final Exam (50 points) CCNA Module 1, I2N
Part 2: - Final Exam (50 points) CCNA Module 2 R&S
Part 3: - written exam network security (50 points),
- written exam subnetting (50 points / optional 25 points)
- optional, skill test Packet Tracer (optional 25 points),
All sub-parts must be passed (>=40%) to pass the course
Conversion from 200 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.
Alphabetical Scale, A(best) – F (fail)
Evaluated by internal examiner, external examiner is used periodically (every four years, next time in 2015/2016)
Single Parts of the exam can be re-taken again.
CISCO Netacademy teaching materials.
Kurose, J. and Ross, K.W. (2008): Computer Networking: A Top-Down Approach, sixth edition. Addison- Wesley (recommended background material).
William Stallings: Cryptography and Network Security: Principles and Practice 6 Ed. (recommended background material).
Replacement course for