Applied Cyber Security
150 contact hours - Swinburne Online
One Semester or equivalent
Online
Overview
This unit engages students in simulated threats in a cyber war environment providing an opportunity to be the attacker and the defender, understand the motivations on both sides, and apply an ethical and legal lens to both sides of the threat. Students will reflect, stratagise and apply lessons to develop a framework for cyber threat prevention.
Requisites
Teaching periods
Location
Start and end dates
Last self-enrolment date
Census date
Last withdraw without fail date
Results released date
Learning outcomes
Students who successfully complete this unit will be able to:
- Describe the threats to network security and their defences from the attacker and the defender view
- Critically analyse a cybersecurity threat scenario and develop management strategies for the protection of an organisation
- Evaluate the theory and practice behind the cyber threat and the role that security management plays in the wider picture of cybersecurity
- Analyse the procedures and practices involved in managing cyber security risks and threats and apply these to a real world situation
Teaching methods
Hawthorn
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Face to Face Contact (Phasing out) Class | 3.00 | 12 weeks | 36 |
Unspecified Learning Activities (Phasing out) Independent Learning | 9.50 | 12 weeks | 114 |
TOTAL | 150 |
Swinburne Online
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Online Directed Online Learning and Independent Learning | 12.50 | 12 weeks | 150 |
TOTAL | 150 |
Assessment
Type | Task | Weighting | ULO's |
---|---|---|---|
Assignment | Individual | 50 - 60% | 1,2,3,4 |
Project | Individual | 40 - 50% | 1,2,3,4 |
Content
- Cyber war games unit
- Ethical hacking
- Software tools to monitor and capture network traffic
- Packet sniffing, spoofing, carrying out cyber attacks
- Attack and defence – human versus the machine
- Disaster recovery – business contingency and disaster recovery plan
- Incident response
- Intrusion detection and prevention
Study resources
Reading materials
A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.