Server Infrastructure and Authentication
Rhedir gan School of Computer Science and Electronic Engineering
20.000 Credydau neu 10.000 Credyd ECTS
Servers are a key tool in enabling an organisation to collaborate with internal and external partners. Maintaining these servers and implementing the right level of security is an integral part of a business’s strategies and plans. If server maintenance is not fully considered in the same way employee’s welfare and work life balance is then complications will arise.
Indicative content includes:
Advantages and Disadvantages
- How servers are utilised in organisations of all sizes.
Planning and Installation
- Including considerations for hardware and software requirements: specifications: memory, processor, managing and storage considerations including disks, volumes and fault tolerance, networking - including teaming, policies, forecast planning, budgets.
- Configuration of common server functions e.g. Domains v workgroups, DNS, DHCP, file-sharing, printing, remote administration, recovery options and Microsoft Active Directory.
- Virtual technology - running virtual server instances for easy deployment for business requirements.
- Authentication techniques - uses, benefits / drawbacks - 5 factors: Something you know, something you have, something you are, somewhere you are and something you do.
- Security principles – securing files and folders, hardening servers, firewalls, DMZs, security policies & procedures, physical security, training of IT staff & users.
- Users and group rights – managing user and group accounts, delegating administration, CIA triad - Confidentiality, Integrity, Accessibility from a practical “best practise” point of view.
- International standards and legislation including ISO 14644-1/ISO 27001, Computer Misuse Act 1990.
- Resource monitoring and control for efficient and effective energy utilisation, UPS, capacity planning, KPIs, backup options – on site/off site, on line/off line and cloud storage.
- Troubleshooting - hardware, software, services and networking.
Equivalent to 40%. Uses key areas of theory or knowledge to meet the Learning Outcomes of the module. Is able to formulate an appropriate solution to accurately solve tasks and questions. Can identify individual aspects, but lacks an awareness of links between them and the wider contexts. Outputs can be understood, but lack structure and/or coherence.
Equivalent to the range 60%-69%. Is able to analyse a task or problem to decide which aspects of theory and knowledge to apply. Solutions are of a workable quality, demonstrating understanding of underlying principles. Major themes can be linked appropriately but may not be able to extend this to individual aspects. Outputs are readily understood, with an appropriate structure but may lack sophistication.
Equivalent to the range 70%+. Assemble critically evaluated, relevant areas of knowledge and theory to construct professional-level solutions to tasks and questions presented. Is able to cross-link themes and aspects to draw considered conclusions. Presents outputs in a cohesive, accurate, and efficient manner.
Discuss server technology along with the benefits and areas of concern to all types of users.
Demonstrate an understanding of the planning and installation of server infrastructures.
Develop evidence to demonstrate practical experience of server functionality.
Demonstrate knowledge of security principles in the implementation of a server installation.
|Server Configuration Lab Exercise Portfolio||30.00|
|Server Management Lab Exercise Portfolio||30.00|
|Server Implementation Report||40.00|
Strategaeth addysgu a dysgu
The classroom-based element will include student-centred learning methods such as interactive lectures, case studies, group discussions and practical workshops.
The tutor directed student learning will be supported by online learning materials hosted or signposted on the VLE.
- Literacy - Proficiency in reading and writing through a variety of media
- Numeracy - Proficiency in using numbers at appropriate levels of accuracy
- Computer Literacy - Proficiency in using a varied range of computer software
- Self-Management - Able to work unsupervised in an efficient, punctual and structured manner. To examine the outcomes of tasks and events, and judge levels of quality and importance
- Inter-personal - Able to question, actively listen, examine given answers and interact sentistevely with others
- Critical analysis & Problem Solving - Able to deconstruct and analyse problems or complex situations. To find solutions to problems through analyses and exploration of all possibilities using appropriate methods, rescources and creativity.
Sgiliau pwnc penodol
- Knowledge and understanding of facts, concepts, principles & theories
- Problem solving strategies
- Analyse if/how a system meets current and future requirements
- Deploy theory in design, implementation and evaluation of systems
- Recognise legal, social, ethical & professional issues
- Specify, design or construct computer-based systems
- Recognise risk/safety for safe operation of computing equipment
- Deploy tools effectively
- Deploy systems to meet business goals
- System Design
- Knowledge and/or understanding of appropriate scientific and engineering principles
- Specify, deploy, verify and maintain computer-based systems
Rhestr ddarllen Talishttp://readinglists.bangor.ac.uk/modules/icl-2012.html
LaCroix, J., 2018. Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server. 2nd Edition. Packt Publishing
Nemeth, E., 2017. UNIX and Linux System Administration Handbook. 5th Edition. Addison-Wesley
Regan, P., 2014. 70-411 Administering Windows Server 2012. Wiley
Regan, P., 2014. 70-411 Administering Windows Server 2012 R2 Lab Manual. Wiley
Zacker, C., 2014. 70-410 Installing and Configuring Windows Server 2012 R2. Wiley
Cyrsiau sy’n cynnwys y modiwl hwn
Gorfodol mewn cyrsiau:
- H115: BSc Applied Cyber Security (Degree Apprenticeship) year 2 (BSC/ACS)
- H119: BSc Applied Cyber Security (Coleg Cambria) year 2 (BSC/ACSC)