Semester 2, 2023 Online | |
Units : | 1 |
School or Department : | School of Business |
Grading basis : | Graded |
Course fee schedule : | /current-students/administration/fees/fee-schedules |
Staffing
Course Coordinator:
Requisites
Pre-requisite: CSC8100
Overview
Cyber security incidents are often considered an unavoidable consequence of conducting modern business. Being able to appropriately, quickly and effectively respond are essential professional and organisational skills to limiting ongoing business impact. Various types of incident responses are explored, which allows responses to be planned and practiced.
Skills developed are teamwork oriented to bring together key elements across the organisation and beyond organisational boundaries including specialists, insurance, police, and government agencies which are vital to a successful response.
This course provides students with the knowledge, skills and processes to enact an appropriate response and recovery when a cyber security incident is detected. Principles of planning, detection, response and recovery to current and emerging cyber security threats are explored. Processes for planning, responding, recovering and reporting incidents are covered. Multiple perspectives are considered including technical, business and media impact.
Course learning outcomes
On successful completion of this course students should be able to:
- apply specialised knowledge, including fundamental knowledge relating to the cyber incident response and recovery process;
- analyse critically, reflect on and synthesise complex issues information, problems, concepts and theories relating to cyber security incidents and how to mitigate business impact;
- implement specialist knowledge and skills in cyber incident response to comprehend the likely impacts on businesses;
- critically examine sources of cyber security incident use cases, and how these can be applied towards improving organisational response and recovery;
- interpret, articulate and communicate complex issues relating to cyber incident response and recovery to achieve targeted outcomes.
Topics
Description | Weighting(%) | |
---|---|---|
1. | The cyber incident management process | 20.00 |
2. | Tool preparation to manage and respond | 10.00 |
3. | Data breach incident response | 20.00 |
4. | Ransomware response | 20.00 |
5. | Advanced and emergent threats | 10.00 |
6. | Cyber incident recovery and reporting | 20.00 |
Text and materials required to be purchased or accessed
Student workload expectations
To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.
Assessment details
Description | Group Assessment |
Weighting (%) | Course learning outcomes |
---|---|---|---|
Quiz | No | 10 | 1,2 |
Essay | No | 40 | 1,2,3,4,5 |
Time limited online examinatn | No | 50 | 1,2,3,4,5 |