Course Title: Introduction to Cyber Security
Part A: Course Overview
Course Title: Introduction to Cyber Security
Credit Points: 12.00
Flexible Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE2665 |
City Campus |
Postgraduate |
175H Computing Technologies |
Internet |
JanJun2025 (All) |
Course Coordinator: Nalin Arachchilage
Course Coordinator Phone: -
Course Coordinator Email: nalin.arachchilage@rmit.edu.au
Course Coordinator Location: -
Course Coordinator Availability: Contact via email
Pre-requisite Courses and Assumed Knowledge and Capabilities
None
Course Description
Cybercrime universally causes harm to individuals, subject matter experts (SMEs), primes, critical infrastructure systems, and governments. As we live in the Internet era, devices connected to the Internet can be exposed to cyber threats. Cyber assurance is vital for business continuity, security of our business processes, supply chain systems and the data systems.
Cyber security is a collection of methods used to protect the integrity of network components, applications, and data from unauthorised access, alteration, or deletion. Enterprises use both cyber security and physical security to protect against unauthorised access to data centres and other computerised systems.
In this course, you will learn about cyber security practices and technologies to safeguard digital assets. Throughout the course, you will learn cyber security concepts, security design principles, concepts of risk-based cyber security, cryptography, principals of authentication, network security, cyber threats and mitigations strategies and legal/ethical aspects.
You will particularly be able to discuss concepts of firewalls, email/web security, and malicious software.
Objectives/Learning Outcomes/Capability Development
Program Learning Outcomes
This course contributes to the program learning outcomes for the following program(s):
GC036OP25 - Graduate Certificate in Cyber Security
PLO 1 Demonstrate specialized knowledge and understanding of scientific theories, principles, concepts, and practices in Cyber Security.
PLO 2 Communicate individual and/or team-based solutions for cyber security problems.
PLO 3 Demonstrate professional integrity, ethical conduct, sustainable and culturally inclusive standards in designing and implementing Cyber Security solutions.
GD162P25 - Graduate Diploma in Cyber Security
PLO 1 Apply an advanced understanding of scientific theories, principles, concepts, and practices in Cyber Security.
PLO 2 Design Cyber Security systems to meet enterprise requirements by employing advanced Cyber Security development tools, techniques and emerging technologies
PLO 4 Communicate and collaborate ideas and threat analysis outcomes to multi-disciplinary stakeholders in various contexts, utilising a variety of digital platforms and traditional formats
PLO 5 Demonstrate professional integrity, ethical conduct, sustainable and culturally inclusive standards in designing and implementing Cyber Security solutions
MC159P25 Master of Cyber Security
PLO 1: Apply an advanced and integrated understanding of scientific theories, principles, concepts, and practices in Cyber Security.
PLO 2: Design Cyber Security systems to meet enterprise requirements by employing advanced Cyber Security development tools, techniques and emerging technologies.
PLO 5: Communicate and collaborate ideas, threat analysis outcomes, project proposals and deliverables to multi-disciplinary stakeholders in various contexts, utilising a variety of digital platforms and traditional formats
PLO 6: Demonstrate professional integrity, ethical conduct, sustainable and culturally inclusive standards with high level personal autonomy and accountability in designing and implementing Cyber Security solutions.
For more information on the program learning outcomes for your program, please see the program guide.
Upon successful completion of this course, you will be able to:
- Describe cyber security hygiene concepts for risk based cyber assurance.
- Explain cryptography and security protocols and their roles in securing the data communication and authenticating the users.
- Identify and evaluate attack prevention and protection methods to safeguard networks and enterprise systems applications
- Describe the design of secure systems for large enterprise applications.
- Apply state-of-the-art cyber security tools to safeguard information systems
- Outline legal and ethical considerations for cybercrime, intellectual property, and computer ethics.
Overview of Learning Activities
This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of online lectures (recorded), lectorials and workshops.
The learning activities included in this course are:
- key concepts will be explained in the lecture recording, while lectorials or workshop, will analyse the subject matters with demonstrations and examples
- tutorials and group discussions (including online forums) will focus on practical work and problem solving by exploring concepts with teaching staff and other students
- assignments work will require an integrated understanding of the subject matters comprising of theory and practice
- private study to analyse course material as presented in the classes will help you to learn cyber security issues and mitigation strategies.
- Delivery may be face to face, online or a mix of both.
You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, and through links and material specific to this course that is available through myRMIT Studies Course.
Overview of Learning Resources
RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course. You will make use of computer laboratories and relevant software provided by the School.
Use the RMIT Bookshop textbook list search page to find recommended textbook(s).
There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal.
Overview of Assessment
Note: This course has no hurdle requirements.
Assessment Task 1: Analysis report of real world cyber attack case study
Weighting: 30%
This assessment task supports CLO 1-2
Assessment Task 2: Project report on Industry-focused cyber security issues.
Weighting: 50%
This assessment task supports CLOs 2-5
Assessment Task 3: End-of-Semester summative Exercise
Weighting: 20%
This assessment supports CLOs 1 – 6
If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.