Semester 2, 2023 Springfield On-campus | |
Units : | 1 |
School or Department : | School of Mathematics, Physics & Computing |
Grading basis : | Graded |
Course fee schedule : | /current-students/administration/fees/fee-schedules |
Staffing
Course Coordinator:
Requisites
Pre-requisite: CSC1050
Overview
In today鈥檚 interconnected world, existing and emerging threats to privacy and security are of ever-growing concern. Security is an integral part of every aspect of information technology, including the network, server infrastructure and even the implementation of programming code. Knowing the nature of security threats, and knowledge of the techniques and tools available to mitigate these threats is a critical skill for today鈥檚 information technology professional.
The course seeks to provide a strong foundation in security concepts and an introduction to techniques and tools in securing information technology infrastructure. In addition to identifying threats, vulnerabilities and human factors in the security space, the course also introduces some hands-on practical skills for improving security in servers and networks. Concepts around information privacy are discussed, as are mechanisms and tools used to implement basic privacy in communications across the internet. Ethics and professional conduct as a security professional are introduced as a key component of the course, as it the relationship between security professionals and parts of the organisation or society in general.
Course learning outcomes
- Explain what security and privacy are in the information technology context;
- Confidently analyse information about security and privacy threats to provide simple strategies for mitigating those threats;
- Utilise simple security tools, such as password crackers, live CDs, and log analysis scripts to perform basic security analysis;
- Confidently design and implement firewall rules on servers and/or networks;
- Relate roles in security to the ACS Code of Ethics;
- Recognise workflows and how the security professional or security team interfaces with other areas of an IT or business organisation.
Topics
Description | Weighting(%) | |
---|---|---|
1. | Security and privacy concepts | 10.00 |
2. | Human factors in security | 10.00 |
3. | An introduction to cryptography | 15.00 |
4. | Basic threat analysis and simple mitigation techniques | 20.00 |
5. | Firewalls in the network and on the server | 20.00 |
6. | VPNs and their use | 5.00 |
7. | An introduction to security tools | 10.00 |
8. | Ethics and conduct as a security professional | 5.00 |
9. | Security professionals and their role in the organisation | 5.00 |
Text and materials required to be purchased or accessed
(ISBN: 9781292220611.)
Please contact us for alternative purchase options.
Student workload expectations
To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.
Assessment details
Description | Group Assessment |
Weighting (%) | Course learning outcomes |
---|---|---|---|
Quiz | No | 10 | 1,2,5,6 |
Problem Solving 1 | No | 20 | 2,3,4 |
Problem Solving 2 | No | 20 | 2,3,4 |
Time limited online examinatn | No | 50 | 1,2,3,4,5,6 |