Server Infrastructure and Authentication
Run by School of Computer Science and Electronic Engineering
20.000 Credits or 10.000 ECTS Credits
Overall aims and purpose
Servers are a key tool in enabling an organisation to collaborate with internal and external partners. Maintaining these servers and implementing the right level of security is an integral part of a business’s strategies and plans. If server maintenance is not fully considered in the same way employee’s welfare and work life balance is then complications will arise.
Indicative content includes:
Advantages and Disadvantages
- How servers are utilised in organisations of all sizes.
Planning and Installation
- Including considerations for hardware and software requirements: specifications: memory, processor, managing and storage considerations including disks, volumes and fault tolerance, networking - including teaming, policies, forecast planning, budgets.
- Configuration of common server functions e.g. Domains v workgroups, DNS, DHCP, file-sharing, printing, remote administration, recovery options and Microsoft Active Directory.
- Virtual technology - running virtual server instances for easy deployment for business requirements.
- Authentication techniques - uses, benefits / drawbacks - 5 factors: Something you know, something you have, something you are, somewhere you are and something you do.
- Security principles – securing files and folders, hardening servers, firewalls, DMZs, security policies & procedures, physical security, training of IT staff & users.
- Users and group rights – managing user and group accounts, delegating administration, CIA triad - Confidentiality, Integrity, Accessibility from a practical “best practise” point of view.
- International standards and legislation including ISO 14644-1/ISO 27001, Computer Misuse Act 1990.
- Resource monitoring and control for efficient and effective energy utilisation, UPS, capacity planning, KPIs, backup options – on site/off site, on line/off line and cloud storage.
- Troubleshooting - hardware, software, services and networking.
Equivalent to 40%. Uses key areas of theory or knowledge to meet the Learning Outcomes of the module. Is able to formulate an appropriate solution to accurately solve tasks and questions. Can identify individual aspects, but lacks an awareness of links between them and the wider contexts. Outputs can be understood, but lack structure and/or coherence.
Equivalent to the range 60%-69%. Is able to analyse a task or problem to decide which aspects of theory and knowledge to apply. Solutions are of a workable quality, demonstrating understanding of underlying principles. Major themes can be linked appropriately but may not be able to extend this to individual aspects. Outputs are readily understood, with an appropriate structure but may lack sophistication.
Equivalent to the range 70%+. Assemble critically evaluated, relevant areas of knowledge and theory to construct professional-level solutions to tasks and questions presented. Is able to cross-link themes and aspects to draw considered conclusions. Presents outputs in a cohesive, accurate, and efficient manner.
Discuss server technology along with the benefits and areas of concern to all types of users.
Demonstrate an understanding of the planning and installation of server infrastructures.
Develop evidence to demonstrate practical experience of server functionality.
Demonstrate knowledge of security principles in the implementation of a server installation.
Teaching and Learning Strategy
The classroom-based element will include student-centred learning methods such as interactive lectures, case studies, group discussions and practical workshops.
The tutor directed student learning will be supported by online learning materials hosted or signposted on the VLE.
- Literacy - Proficiency in reading and writing through a variety of media
- Numeracy - Proficiency in using numbers at appropriate levels of accuracy
- Computer Literacy - Proficiency in using a varied range of computer software
- Self-Management - Able to work unsupervised in an efficient, punctual and structured manner. To examine the outcomes of tasks and events, and judge levels of quality and importance
- Inter-personal - Able to question, actively listen, examine given answers and interact sentistevely with others
- Critical analysis & Problem Solving - Able to deconstruct and analyse problems or complex situations. To find solutions to problems through analyses and exploration of all possibilities using appropriate methods, rescources and creativity.
Subject specific skills
- Knowledge and understanding of facts, concepts, principles & theories
- Problem solving strategies
- Analyse if/how a system meets current and future requirements
- Deploy theory in design, implementation and evaluation of systems
- Recognise legal, social, ethical & professional issues
- Specify, design or construct computer-based systems
- Recognise risk/safety for safe operation of computing equipment
- Deploy tools effectively
- Deploy systems to meet business goals
- System Design
- Knowledge and/or understanding of appropriate scientific and engineering principles
- Specify, deploy, verify and maintain computer-based systems
Talis Reading listhttp://readinglists.bangor.ac.uk/modules/icl-2012.html
LaCroix, J., 2018. Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server. 2nd Edition. Packt Publishing
Nemeth, E., 2017. UNIX and Linux System Administration Handbook. 5th Edition. Addison-Wesley
Regan, P., 2014. 70-411 Administering Windows Server 2012. Wiley
Regan, P., 2014. 70-411 Administering Windows Server 2012 R2 Lab Manual. Wiley
Zacker, C., 2014. 70-410 Installing and Configuring Windows Server 2012 R2. Wiley
Courses including this module
Compulsory in courses:
- H115: BSc Applied Cyber Security (Degree Apprenticeship) year 2 (BSC/ACS)
- H119: BSc Applied Cyber Security (Coleg Cambria) year 2 (BSC/ACSC)