MIT508 Cyber Security

Unit outline

Important Update: Our aim is to provide you with an optimal learning experience, regardless of how this unit is delivered. Teaching will be delivered in line with the most current COVID Safe health guidelines.  This may include a mix of online and face-to-face.  Please check the learning management system for announcements and updates. Thank you for your flexibility and commitment to studying with Sydney Institute of Higher Education. 
Enrolment modes: Year 1, Semester 2
Credit point(s): 12.5
EFTSL value: 0.125
Prerequisite: MIT504 Networking   
Typical study commitment: Students will on average spend 10 hours per week over the teaching period undertaking the teaching, learning and assessment activities for this unit.
Scheduled learning activities: 4 timetabled hours per week, 6 personal study hours per week

Unit description 

This unit will introduce students to the real-world cyber security issues faced by the community and by industry. Students will explore cyber security from both an attacker’s and defender’s viewpoint and will learn how vulnerabilities and threats are assessed and managed. The unit further introduces students to various tools, techniques, and methods to mitigate various security threats and attacks on contemporary computing and network systems. Students will develop risk management plans and will also learn about proactive secure design techniques, incident response and disaster recovery.

Unit learning outcomes (ULO)   

On the successful completion of this units student will be able to:
ULO1 Discuss the major cyber security threats.
ULO2 Compare and contrast the tools, technologies, and techniques used in offensive and defensive security practices.
ULO3 Analyse cyber security risk and critically reflect on risk management solutions.
ULO4 Apply the fundamental concepts and principles of cyber security to system design.
ULO5 Appraise mitigation strategies for given scenarios.

Topics to be included in the unit

1. Introduction to Cyber Security
2. The Need for Security: Threats and Attacks
3. Cryptography and Public Key Infrastructure
4. Security Technologies: Access Control, Firewalls and VPNs
5. Risk management
6. Security Technologies: Intrusion Detection and Prevention Systems, and Other Security Tools
7. Planning for Security
8. Legal, Ethical, and Professional Issues in Cyber Security
9. Implementation and Maintenance of Information Security
10. Physical Security
11. Emerging Topics in Cyber Security: Security in Cloud Computing
12. Emerging Topics in Cyber Security: Security in Internet of Things (IoT) and Revision


Assessment Description Grading and weighting
(% total mark for unit)
Indicative due week 
Assessment 1: Class Participation 30% 12
Assessment 2: Online Quiz 10% 6
Assessment 3: Individual Report 30% 12
Assessment 5: Final Exam 30% Final exam week

The assessment due weeks provided may change. Your lecturer will clarify the exact assessment requirements, including the due date, at the start of the teaching period.