Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Fully Online
Duration
Not Available
Details
Program Details
Degree
Courses
Major
Computer Science | Cybersecurity | Network Security
Area of study
Information and Communication Technologies | Security Services
Education type
Fully Online
Course Language
English
Intakes
Program start dateApplication deadline
2023-07-01-
About Program

Program Overview


Course Specification

The current and official versions of the course specifications are available on the web.


CSC2320 Security 1: Cybersecurity Foundations

Overview

In today's interconnected world, existing and emerging threats to privacy and security are of ever-growing concern. Security is an integral part of every aspect of information technology, including the network, server infrastructure and even the implementation of programming code. Knowing the nature of security threats, and knowledge of the techniques and tools available to mitigate these threats is a critical skill for today's information technology professional.


The course seeks to provide a strong foundation in security concepts and an introduction to techniques and tools in securing information technology infrastructure. In addition to identifying threats, vulnerabilities and human factors in the security space, the course also introduces some hands-on practical skills for improving security in servers and networks. Concepts around information privacy are discussed, as are mechanisms and tools used to implement basic privacy in communications across the internet. Ethics and professional conduct as a security professional are introduced as a key component of the course, as is the relationship between security professionals and parts of the organisation or society in general.


Staffing

  • Course Coordinator: Wencheng Yang

Requisites

  • Pre-requisite: CSC1050

Course Learning Outcomes

  1. Explain what security and privacy are in the information technology context;
  2. Confidently analyse information about security and privacy threats to provide simple strategies for mitigating those threats;
  3. Utilise simple security tools, such as password crackers, live CDs, and log analysis scripts to perform basic security analysis;
  4. Confidently design and implement firewall rules on servers and/or networks;
  5. Relate roles in security to the ACS Code of Ethics;
  6. Recognise workflows and how the security professional or security team interfaces with other areas of an IT or business organisation.

Topics

Description Weighting(%)
  1. | Security and privacy concepts | 10.00
  2. | Human factors in security | 10.00
  3. | An introduction to cryptography | 15.00
  4. | Basic threat analysis and simple mitigation techniques | 20.00
  5. | Firewalls in the network and on the server | 20.00
  6. | VPNs and their use | 5.00
  7. | An introduction to security tools | 10.00
  8. | Ethics and conduct as a security professional | 5.00
  9. | Security professionals and their role in the organisation | 5.00

Text and Materials Required

  • Stallings, W. and Brown, L. 2018, Computer Security Principles and Practice, 4th edn, Pearson Higher Ed.

Student Workload Expectations

To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.


Assessment Details

Approach | Type | Description | Group
Assessment | Weighting (%) | Course learning outcomes
---|---|---|---|---|---
Assignments | Written | Quiz | No | 10 | 1,2,5,6
Assignments | Written | Problem Solving 1 | No | 20 | 2,3,4
Assignments | Written | Problem Solving 2 | No | 20 | 2,3,4
Examinations | Non-invigilated | Time limited online examination | No | 50 | 1,2,3,4,5,6


Course Details

  • Semester: 2, 2023
  • Delivery Mode: Online
  • Units: 1
  • School or Department: School of Mathematics, Physics & Computing
  • Grading basis: Graded
  • Course fee schedule: Available upon request
See More