Course Title: Practical Cybersecurity for Business
Part A: Course Overview
Course Title: Practical Cybersecurity for Business
Credit Points: 12.00
Important Information:
Course Title Amendment
2024 Practical Cybersecurity for Business
2023 ICT Information Systems Security
Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE2403 |
City Campus |
Undergraduate |
620H Business IT and Logistics |
Face-to-Face |
Sem 2 2007, Sem 2 2008, Sem 2 2009, Sem 2 2010, Summer2011, Summer2012, Sem 2 2019, Sem 2 2020, Sem 2 2021 |
INTE2403 |
City Campus |
Undergraduate |
665H Accounting, Information Systems and Supply Chain |
Face-to-Face |
Sem 2 2022, Sem 2 2023, Sem 2 2024 |
Course Coordinator: Dr Shahriar Kaisar
Course Coordinator Phone: +61 3 9925 7499
Course Coordinator Email: shahriar.kaisar@rmit.edu.au
Course Coordinator Location: Building 80, City Campus
Course Coordinator Availability: via email
Pre-requisite Courses and Assumed Knowledge and Capabilities
None
Course Description
This course seeks to introduce students to the technical aspects of Information Systems (IS) security in the context of the modern enterprise. It builds on the students’ growing knowledge and experience of business to provide the background to the serious issues surrounding IS security. This course will bring students up to date with the latest IS threats to enterprises, their identification and management, and ultimately, mitigation and countermeasures.
Objectives/Learning Outcomes/Capability Development
-
At the conclusion of this course, you should be able to:
CLO1 Investigate relevant information sources of Information Systems (IS) security threats and communicate individual/team research findings.
CLO2 Analyse the economic impacts of IS security threats on enterprises.
CLO3 Outline the technologies that allow IS security threats to be perpetrated.
CLO4 Develop a set of technical and business skills to address malicious IS security threats.
CLO5 Design a risk mitigation policy, that considers the ethical and legal constraints associated with businesses protecting against malicious cyber attacks.
Overview of Learning Activities
This course requires students to participate in various learning activities. These activities comprise the following:
- Attendance at and participation in lectures.
- Directed Internet-based research on current issues.
- Laboratory classes designed to supplement theoretical knowledge and to allow students the rich learning experience of a practical nature.
Overview of Learning Resources
Various learning resources are available online through MyRMIT Studies\Canvas. The lecture notes and workshop notes are posted on Canvas.
Resources are also available online through RMIT Library databases and other facilities. Visit the RMIT library website for further details. Assistance is available online via our chat and email services, face to face at our campus libraries or via the telephone on (03) 9925 2020.
Additional resources and/or sources to assist your learning will be identified by your course coordinator and will be made available to you as required during the teaching period.
Overview of Assessment
The assessment tasks, their weighting and the course learning outcomes to which they are aligned are as follows:
Assessment Task 1: 20%
Linked CLOs: 1, 2, 3
Assessment Task 2: 40%
Linked CLOs: 1, 3, 4
Assessment Task 3: 40%
Linked CLOs: 1, 3, 4, 5
Feedback will be provided throughout the semester in class and/or in online forums through individual and group feedback on practical exercises and by individual consultation.