Course Title: Network Security

Part A: Course Overview

Course Title: Network Security

Credit Points: 12.00

Course Code




Learning Mode

Teaching Period(s)


City Campus


140H Computer Science & Information Technology


Sem 2 2006,
Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Sem 2 2011


City Campus


140H Computer Science & Information Technology


Sem 2 2006,
Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Sem 2 2011

Course Coordinator: Dr. Peter Bertok

Course Coordinator Phone: +61 3 9925 1851

Course Coordinator Email:

Course Coordinator Location: 14.11.20

Pre-requisite Courses and Assumed Knowledge and Capabilities

You may not enrol in this course unless it is explicitly listed in your enrolment program summary, and you have confirmed with your program coordinator that it is an appropriate choice for your study plan.

You should have capabilities acquired in Data Communications and Net-Centric Computing or in a similar course.  In particular, you should be familiar with Networking technologies including the TCP/IP reference model.

Course Description

This course aims to introduce you to secure networking. It will introduce basic and some advanced concepts in security, and their implementation in networks.
In this course you will also learn how to analyse and assess security of network installations in different setups.

Objectives/Learning Outcomes/Capability Development

Capabilities developed in this course.
In this course, you will learn
Critical analysis:
• Analyse security risks in networks;
Problem solving:
• Apply security mechanisms, security policies, security components (such as protection domains and firewalls), port security and protection to secure networks;
• Explain complex security concepts,;
• Effectively apply relevant standards, ethical considerations, and an understanding of privacy issues to designing secure networks.

Learning outcomes
Upon successful completion of this course, you should be able to:
• Provide security assessment of networks
• Use the basic concepts of secure communication via insecure networks to design secure architectures;
• Describe and justify relevant alternatives and decision recommendations
• Implement security management in networks;

Overview of Learning Activities

This course consists of lectures, tutorials, and laboratory classes. The lectures will be devoted to the presentation of new material. The
tutorials reinforce the concepts via exercises, and show the material  from a different perspective. The laboratory sessions will be used for practical exercises illustrating the material and providing hands-on experience.

Overview of Learning Resources

You will make extensive use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through the Learning Hub (also known as online@RMIT) and may be provided with copies of additional materials in class or via email. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

Use the RMIT Bookshop’s textbook list search page to find any recommended textbook(s).

Overview of Assessment

The assessment for this course comprises of assignments and a formal written examination.

For standard assessment details, including hurdle requirements, relating to Computer Science and IT courses see: