Unit outline
Important Update: | Our aim is to provide you with an optimal learning experience, regardless of how this unit is delivered. Teaching will be delivered in line with the most current COVID Safe health guidelines. This may include a mix of online and face-to-face. Please check the learning management system for announcements and updates. Thank you for your flexibility and commitment to studying with Sydney Institute of Higher Education. |
---|---|
Enrolment modes: | Year 3, Semester 1 |
Credit point(s): | 12.5 |
EFTSL value: | 0.125 |
Prerequisite: | BIT102 Networking, BIT202 Cyber Security |
Typical study commitment: | Students will on average spend 12 hours per week over the teaching period undertaking the teaching, learning and assessment activities for this unit. |
Scheduled learning activities: | 4 timetabled hours per week, 8 personal study hours per week |
Other resource requirements: | Students will need access to lab computers or will need their own laptops in order to carry out lab exercises and assignments.
Kali Linux |
Unit description
Students will gain a comprehensive overview and knowledge of the field of Network Security which includes Malware and Social Engineering, Advanced Cryptography, public-key cryptography, Network Server Attacks and Defences, Authentication and Account Management, Vulnerability and Risk Management. This unit explores the concepts and specialised applications of network security and the risks associated with them. There are some activities designed to develop students’ abilities to protect network data and respond and recover from security incidents.
Unit Outline Outcomes (ULO)
On the successful completion of this units student will be able to: | ||
ULO1 | Discuss the main security issues and emerging trends of Network Security. | |
ULO2 | Describe and demonstrate basic understanding level of Cryptography. | |
ULO3 | Analyse common threats, attacks, mitigation of network systems. | |
ULO4 | Explain the major methodologies to secure network systems. | |
ULO5 | Design and implement common authentication and access management. | |
ULO6 | Evaluate and explore the vulnerability and risk mitigation. |
Topics to be included
1. | Introduction to Security |
2. | Threat Management and Cyber Security Resources |
3. | Threat and Attacks on Endpoints |
4. | Endpoint and Application Development Security |
5. | Basic Cryptography |
6. | Public Key Infrastructure and Cryptographic Protocols |
7. | Networking Threats, Assessment and Defences |
8. | Network Security Appliances and Technologies |
9. | Cloud and Virtualization Security |
10. | Authentication |
11. | Cybersecurity Resilience |
12. | Risk Management & Revision |
Assessment
Assessment Description | Grading and weighting (% total mark for unit) |
Indicative due week |
Assessment 1: Mid-Semester Exam | 10% | Mid-semester week |
Assessment 2: Group Assignment 1 | 15% | 8 |
Assessment 3: Individual Assignment 2 | 20% | 12 |
Assessment 4: Laboratory (10 Labs) | 10% | Weekly |
Assessment 5: Final Exam | 45% | Final exam week |
The assessment due weeks provided may change. Your lecturer will clarify the exact assessment requirements, including the due date, at the start of the teaching period.