Internet Security
Overview
Students who complete this unit will understand security threats, ICT ethics, and the deficiencies in modern software systems. They will learn to manage network security, recognize tools used by hackers, identify and address security breaches, and solve complex cybersecurity challenges.
Requisites
COS60004 Creating Web Applications
OR
COS60007 Creating Web Applications and Databases
OR
Admission into MA-ITPC1 - Master of Information Technology (Professional Computing)
OR
Admission into MA-ITPC - Master of Information Technology (Professional Computing)
AND
TNE60002 Network Administration
OR
COS70007 Data Communications and Security
OR
COS80021 Web Application Development
OR
TNE60006 Networks and Switching
01-June-2025
Learning outcomes
Students who successfully complete this unit will be able to:
- Evaluate security and privacy of networks and servers
- Develop management plans for system security
- Plan security audits with a focus on ICT ethics
- Understand social engineering concepts and assess system risks influenced by human behavior
- Utilize a range of security tools to solve complex cybersecurity problems
- Identify potential vulnerabilities through a solid understanding of network monitoring concepts
Teaching methods
Hawthorn
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Online Lecture |
1.00 | 12 weeks | 12 |
Live Online Class |
1.00 | 12 weeks | 12 |
On-campus Class |
2.00 | 12 weeks | 24 |
Unspecified Activities Independent Learning |
8.50 | 12 weeks | 102 |
TOTAL | 150 |
Assessment
Type | Task | Weighting | ULO's |
---|---|---|---|
Research Project | Individual | 30 - 40% | 3,4,5,6 |
Applied Project | Individual | 30 - 40% | 1,2,3,4,5,6,7 |
Laboratory Practicals | Individual | 10 - 20% | 1,2,3,4,5,6,7 |
Test | Individual | 10 - 20% | 1,2,3,4,7 |
Content
- Overview of network and computer security threats
- Physical and converged security
- Operating system
- Secure programming practices
- Port scanning, packet sniffing and intrusion detection
- Understanding and responding to security alerts
- Server technologies, risks and policies
- Vulnerability analysis and Audit
- Security models
- Authentication (identity, biometrics and digital signatures)
- Digital forensics
- ICT ethics and privacy
Study resources
Reading materials
A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.