Semester 1, 2023 Toowoomba On-campus | |
Units : | 1 |
School or Department : | School of Mathematics, Physics & Computing |
Grading basis : | Graded |
Course fee schedule : | /current-students/administration/fees/fee-schedules |
Staffing
Course Coordinator:
Requisites
Pre-requisite: CSC2408
Overview
System and security administration is management and configuration of one or more computers with multiple operating systems, multiple hardware architectures, multiple software suites, together with the shared resources necessary, such as wired and wireless networks, to make them work effectively and securely. System administration requires an understanding of how computer systems work, an attention to detail, problem solving, people skills, security and planning. Computers which function as servers may run Unix-like systems, although others run proprietary software such as Novell, IBM or Microsoft.
This course provides students with a comprehensive understanding of the administration of computer systems and computer networks. Coverage includes system administration tools, security techniques, system initialisation, resource management, backups, performance measurement, network and security administration and ethical considerations. Students will develop and appraise documentation policy and disaster recovery procedures. Practical work requires use of Unix- like operating systems on dedicated Intel-architecture PCs or equivalent hardware and software.
Course learning outcomes
On completion of this course students will be able to:
- Demonstrate an intermediate level of understanding of general principles of computer system administration including ethical considerations(Assignment 1, Exam);
- Analyse and apply security techniques to enhance computer system security and communication (Assignment 1, Exam);
- Select, install, and configure applications on an Open Source operating system (Assignment 1 and 2, Exam);
- Design and implement system procedures for backup and recovery (Assignment 2, Exam);
- Organise and maintain routing tables and firewalls (Assignment 3, Exam);
- Demonstrate an appreciation for the intrusion detection systems and techniques (Assignment 3, Exam).
Topics
Description | Weighting(%) | |
---|---|---|
1. | Introduction | 10.00 |
2. | Linux basics | 10.00 |
3. | System Programming | 5.00 |
4. | Encryption, Authentication Techniques | 10.00 |
5. | File system, Partitioning | 10.00 |
6. | Security, monitoring, audit | 10.00 |
7. | Resource management | 5.00 |
8. | Network services, DNS, DHCP, HTTP, SSH, SAMBA | 15.00 |
9. | Data and network security | 15.00 |
10. | Ethical systems administration | 10.00 |
Text and materials required to be purchased or accessed
Student workload expectations
To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.
Assessment details
Description | Group Assessment |
Weighting (%) | Course learning outcomes |
---|---|---|---|
Report 1 | No | 15 | 1,2,3 |
Report 2 | No | 15 | 3,4 |
Report 3 | No | 20 | 5,6 |
Time limited online examinatn | No | 50 | 1,2,3,4,5,6 |