Course Title: Manage network security

Part A: Course Overview

Program: C5394 Diploma of Information Technology Networking

Course Title: Manage network security

Portfolio: SEH Portfolio Office

Nominal Hours: 80

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

COSC7380C

City Campus

TAFE

174T School of VE Engineering, Health & Science

Face-to-Face or Internet

Term1 2020,
Term2 2020

Course Contact: Program Manager

Course Contact Phone: +61 3 9925 4468

Course Contact Email: vehs@rmit.edu.au



Course Description

This unit describes the skills and knowledge required to implement and manage security functions throughout a network.

It applies to individuals with excellent information and communications technology (ICT) expertise who lead the development of strategic reviews of security and provide technical advice, guidance and leadership in resolution of specified problems.

Pre-requisite Courses and Assumed Knowledge and Capabilities

None



National Competency Codes and Titles

National Element Code & Title:

ICTNWK511 Manage network security

Elements:

1. Define a process for designing security

2. Identify threats to network security

3. Analyse security risks

4. Create a security design

5. Design and implement responses to security incidents


Learning Outcomes

Activities in this course have been designed to enhance your knowledge in various aspects of network security. 

On successful completion of this course you will be able to:

  • Understand the need for Cybersecurity
  • The Cybersecurity Cube
  • Threat Modelling
  • Understand Cyber Security Threats, Vulnerabilities, and Attacks
  • Protecting Information
  • Plan, Build and Manage a Network Security Design
  • Security Policies


Overview of Assessment

Assessments
Task 1 Knowledge Tests
Task 2 Assignment
Task 3 Project

These tasks assesses the following Course Learning Outcomes (CLOs):

Assessment Mapping Matrix

Element/

Performance Criteria Covered

Task 1

Task 2

Task 3

1.1

 x

 

x

1.2

 x

 

x

1.3

 x

 

x

2.1

x

 

 

2.2

X

 

 

2.3

x

 

 

2.4

 

 x

 

2.5

 

 x

 

3.1

 x

 

 

3.2

 

 x

 

3.3

 

 x

 

3.4

 

 

x

4.1

 

 

x

4.2

 

 x

 

4.3

 

 x

 

4.4

 

 

x

5.1

 

 

x

5.2

 x

 

 

5.3

 

 

 x

5.4

 

 x

 




To be deemed competent you must demonstrate an understanding of all aspects required of the competency. Assessment methods have been designed to measure your achievement of each competency in a flexible manner over multiple tasks.