Course Title: Security in Computing and Information Technology

Part A: Course Overview

Course Title: Security in Computing and Information Technology

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

COSC2536

City Campus

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 2 2011,
Sem 1 2012,
Sem 2 2012,
Sem 1 2013,
Sem 2 2013,
Sem 1 2014,
Sem 2 2014,
Sem 2 2015,
Sem 1 2016,
Sem 2 2016

COSC2536

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 2 2017,
Sem 1 2018,
Sem 2 2018,
Sem 1 2019,
Sem 2 2019,
Sem 1 2020,
Sem 2 2020,
Sem 1 2021

COSC2536

City Campus

Undergraduate

175H Computing Technologies

Face-to-Face

Sem 1 2022,
Sem 2 2024

COSC2537

City Campus

Postgraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 2 2011,
Sem 1 2012,
Sem 2 2012,
Sem 1 2013,
Sem 2 2013,
Sem 1 2014,
Sem 2 2014,
Sem 2 2015,
Sem 1 2016,
Sem 2 2016

COSC2537

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 1 2017,
Sem 2 2017,
Sem 1 2018,
Sem 1 2019,
Sem 2 2019,
Sem 1 2020,
Sem 2 2020

COSC2539

RMIT University Vietnam

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Viet2 2011,
Viet1 2012,
Viet3 2012,
Viet2 2013,
Viet1 2014,
Viet3 2014,
Viet2 2015,
Viet1 2016,
Viet3 2016

COSC2539

RMIT University Vietnam

Undergraduate

171H School of Science

Face-to-Face

Viet2 2017,
Viet3 2018,
Viet3 2019,
Viet3 2020,
Viet3 2021

COSC2539

RMIT University Vietnam

Undergraduate

175H Computing Technologies

Face-to-Face

Viet2 2022,
Viet3 2022,
Viet2 2023,
Viet3 2023

COSC2539

RMIT University Vietnam

Undergraduate

175H Computing Technologies

Internet

Viet1 2024

COSC2651

Open Learning Australia

Non Award

171H School of Science

Distance / Correspondence

OUASP2UG21

COSC2651

Open Learning Australia

Non Award

175H Computing Technologies

Distance / Correspondence

OUASP4UG23

COSC2716

RMIT Vietnam Hanoi Campus

Undergraduate

175H Computing Technologies

Face-to-Face

Viet2 2023,
Viet3 2023

COSC2716

RMIT Vietnam Hanoi Campus

Undergraduate

175H Computing Technologies

Internet

Viet1 2024

Course Coordinator: Shekhar Kalra

Course Coordinator Phone: +61 3 9925 9500

Course Coordinator Email: shekhar.kalra@rmit.edu.au

Course Coordinator Availability: by appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

A functional knowledge of Java or Python is needed for this course.


Course Description

Security has become a focal area in IT; it has grown and evolved significantly in recent years and different areas of specialisation have emerged.

This course gives an introduction to technical aspects of security for future IT professionals, and presents the foundations. It looks at fundamental cryptographic and security mechanisms used in various areas of networked applications and computing, including operating systems, databases and other relevant applications as well as modern privacy preserving systems. The course will also introduce the fundamental discussion involving fraud detection using Machine Learning.

For computer systems that are used and relied upon in many areas of life, security has become an important aspect; availability and correct operation are essential. IT professionals working in the field need to be well acquainted with the security features of the tools and applications they use and produce. Protection of data regardless of the information they contain is a critical task, and requires expertise.


Objectives/Learning Outcomes/Capability Development

This course contributes to program learning outcomes in BP355 Bachelor of Cyber Security and BP356 Bachelor of Cyber Security (Professional).

  • PLO 1: Knowledge - Develop and integrate a broad and coherent set of knowledge and skills for developing user-centric cyber security solutions for contemporary societal challenges 
  • PLO 2: Problem Solving - Apply systematic problem solving and decision-making methodologies to identify, design and implement cyber security solutions to real world problems
  • PLO 3: Cognitive and Technical Skill - Critically analyse and evaluate user requirements and design systems employing software development tools, techniques and emerging technologies.
  • PLO 6: Responsibility and Accountability - Advocate and critically review integrity, ethical conduct, sustainable and culturally inclusive professional standards, including First Nations knowledges and input in designing and implementing cyber security solutions. 

For more information on the program learning outcomes for your program, please see the program guide


Upon successful completion of this course, you will be able to:

  1. Explain the functioning of security services in computing environments and the security issues in networked applications.
  2. Discuss and implement various types of data integrity and confidentiality mechanisms including cryptography.
  3. Describe basic system security mechanisms and protocols, such as those used in operating systems, file systems and computer networks.
  4. Analyse the overarching importance of IT security in areas such as networking, databases, operating systems, and web systems.
  5. Analyse and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing.


Overview of Learning Activities

This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of lectorials and practicals.

You will examine and analyse program constructs and structures and their relevance to security.

You will be actively engaged in a range of learning activities such as:

  • key concepts will be explained in lectorials, classes and Canvas, where course material will be presented and the subject matter will be illustrated with demonstrations and examples
  • practicals and group discussions (including discussion boards) focused on practical work and problem solving will provide practice in the application of principles and procedures, allow exploration of concepts with teaching staff and other students
  • assignment work requires an integrated understanding of the subject matter with the application of theory to practice and coding
  • private study, working through the course as presented in classes and learning materials, and gaining practice at analysing conceptual and technical issues related to security and privacy.

You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, and through links and material specific to this course that is available through myRMIT Studies Course


Overview of Learning Resources

RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course. You will make use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through myRMIT and may be provided with additional materials. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal.

For extra support with study organisation, assignment planning or learning skills advice you may wish to contact the Study and Learning Centre: https://www.rmit.edu.au/students/support-services/study-support/consultations.


Overview of Assessment

The assessment for this course comprises practical work involving the development of computer programs, reports and in-class face to face timed assessments.

Note: This course has no hurdle requirements.

Assessment Task 1: Analytical Security Report
Weighting: 35%
This assessment task supports CLOs: 1 - 3

Assessment Task 2: Programming-based Security Project
Weighting: 45%
This assessment task supports CLOs: 2 - 5

Assessment Task 3: End-of-Semester in-class face-to-face timed-exercise
Weighting: 20%
This assessment task supports CLOs: 1 - 5. 

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.