BIT202 Cyber Security
Unit outline
Important Update: | Our aim is to provide you with an optimal learning experience, regardless of how this unit is delivered. Teaching will be delivered in line with the most current COVID Safe health guidelines. This may include a mix of online and face-to-face. Please check the learning management system for announcements and updates. Thank you for your flexibility and commitment to studying with Sydney Institute of Higher Education. |
---|---|
Enrolment modes: | Year 2, Semester 1 |
Credit point(s): | 12.5 |
EFTSL value: | 0.125 |
Prerequisite: | BUS102 Introduction to IT, BIT102 Networking |
Typical study commitment: | Students will on average spend 10 hours per week over the teaching period undertaking the teaching, learning and assessment activities for this unit. |
Scheduled learning activities: | 4 timetabled hours per week, 6 personal study hours per week |
Other resource requirements: | Wireshark and Packet Tracer |
Unit description
This unit will introduce students to the real-world cyber security issues faced by the community and by industry. Students will explore cyber security from both an attacker’s and defender’s viewpoint and will learn how vulnerabilities and threats are assessed and managed. The unit further introduces students to various tools, techniques and methods to mitigate various security threats and attacks on contemporary computing and network systems. Students will develop risk management plans and will also learn about proactive secure design techniques, incident response and disaster recovery.
Unit learning outcomes (ULO)
On the successful completion of this units student will be able to: | |
ULO1 | Demonstrate an understanding of cyber security threats, attacks and common vulnerabilities. |
ULO2 | Demonstrate a thorough knowledge of important security tools such as Authentication, Access Control, and Cryptographic Techniques. |
ULO3 | Analyze and critically evaluate various security technologies such as Firewalls, Virtual Private Networks (VPNs) and Intrusion Detection and Prevention Systems (IDPSs). |
ULO4 | Analyze and apply various security management strategies including risk analysis, implementation, incident handling and maintenance. |
ULO5 | Demonstrate an understanding of various attacks and threats present in modern computer systems such as Internet of Things (IoT) and Cloud Computing. |
Topics to be included in the unit
1. | Introduction to Cyber Security |
2. | The Need for Security: Threats and Attacks |
3. | Cryptography and Public Key Infrastructure |
4. | Security Technologies: Access Control, Firewalls and VPNs |
5. | Legal, Ethical, and Professional Issues in Cyber Security |
6. | Security Technologies: Intrusion Detection and Prevention Systems, and Other Security Tools |
7. | Risk management |
8. | Planning for Security |
9. | Implementation and Maintenance of Information Security |
10. | Physical Security |
11. | Emerging Topics in Cyber Security: Security in Cloud Computing |
12. | Emerging Topics in Cyber Security: Security in Internet of Things (IoT) and Revision |
Assessment
Assessment Description |
Grading and weighting (% total mark for unit) |
Indicative due week |
Assessment 1: Class Participation | 20% | 11 |
Assessment 2: Online Quiz | 10% | 7 |
Assessment 3: Report | 30% | 12 |
Assessment 4: Final Exam | 40% | Final exam week |
The assessment due weeks provided may change. Your lecturer will clarify the exact assessment requirements, including the due date, at the start of the teaching period.