Semester 2, 2023 Online | |
Units : | 1 |
School or Department : | School of Mathematics, Physics & Computing |
Grading basis : | Graded |
Course fee schedule : | /current-students/administration/fees/fee-schedules |
Staffing
Course Coordinator:
Requisites
Pre-requisite: CSC8520
Overview
In today鈥檚 interconnected world, existing and emerging threats to privacy and security are of ever-growing concern. In addition to technical skills, security professionals need to be aware of the regulatory and ethical dimensions of security and privacy. Development of sound security policies and procedures to ensure compliance via security auditing are crucial in being confident that an organisation鈥檚 data and communications are secure. This advanced course forms an end-point in the formal investigation into network security, and provides the technical skills for practitioners to continue to grow their expertise over a large range of present and future security technologies.
Building on basic knowledge of security concepts, this course introduces more advanced topics in network security. Students will gain knowledge and hands-on experience with AAA (authentication, authorization and accounting), and other concepts around network security auditing. A key task for network security professionals, beyond the technical skills, is to take business requirements and craft appropriate policies, with reference to regulations and ethical conduct, and thus the course discusses ethics and legal issues in network security and privacy and also presents methods of developing security policy.
Course learning outcomes
On completion of this course students should be able to:
- Confidently analyse business requirements and develop security and privacy policies;
- Adequately apply regulatory, cultural and ethical dimensions of security and privacy to the practice of network management;
- Utilise AAA tools to audit security, identify security vulnerabilities, and implement access control to servers or applications;
- Analyse and manage server security issues and implement server hardening professionally;
- Relate roles in security to the ACS Code of Ethics;
- Identify and critically assess emerging trends in wireless networking.
Topics
Description | Weighting(%) | |
---|---|---|
1. | Developing security policy | 10.00 |
2. | AAA and multifactor authentication | 15.00 |
3. | Privacy policies and data management | 10.00 |
4. | Security auditing and Intrusion detection and prevention | 30.00 |
5. | Server security and server hardening | 15.00 |
6. | Server security and server hardening | 10.00 |
7. | Emerging trends and regulatory, cultural, and ethical dimensions in network security management | 10.00 |
Text and materials required to be purchased or accessed
Student workload expectations
To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.
Assessment details
Description | Group Assessment |
Weighting (%) | Course learning outcomes |
---|---|---|---|
Planning document | No | 24 | 1,2,5,7 |
Tech and/or scntific artefact | No | 26 | 3,4,5 |
Report | No | 50 | 1,2,3,4,5,6,7,8 |