Course Title: Design and manage enterprise computer networks

Part B: Course Detail

Teaching Period: Term2 2016

Course Code: COSC6153C

Course Title: Design and manage enterprise computer networks

School: 130T Vocational Engineering

Campus: City Campus

Program: C6121 - Advanced Diploma of Computer Systems Engineering

Course Contact: Program Manager

Course Contact Phone: +61 3 9925 4468

Course Contact Email: vocengineering@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Luke Eberbach
Phone: +61 3 99254381
Email: luke.eberbach@rmit.edu.au

Nominal Hours: 80

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

UEENEEE101A

Course Description

This unit covers designing and managing enterprise computer networks. It encompasses safe working practices, the design and management of network and application services, core identity and access management components, directory services infrastructure components, designing physical and logical directory service topologies, designing a public key infrastructure (PKI), designing for business continuity and data availability, and documenting all design and management activities.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

UEENEED114A Design and manage enterprise computer networks

Element:

1 Develop design for an enterprise network.

Performance Criteria:

1.1 OHS processes and procedures for a given work area are identified, obtained and understood.
1.2 The extent of the network to be designed is determined from design brief and/or in consultation with appropriate persons.
1.3 Business requirements of the enterprise are analysed taking into account existing and projected business model, organisational and Information Technology management structures.
1.4 Consideration is given to factors that will have an impact on the design such as business priorities, growth, growth strategy, regulatory framework, risk, and cost.
1.5 Existing and planned technical and environment goals of the enterprise are evaluated and documented. (See Note 1)
1.6 Consideration is given to technical factors that will have an impact on the design. (See Note 2)
1.7 Client access and end-user needs and usage patterns and disaster recovery requirements are evaluated and documented.
1.8 Design specification is written using information obtained from the analysis and evaluations of enterprise business and technical requirements.
1.9 Network specification is presented and discussed with person(s) of higher authority.
1.10 Alterations to the network specification resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.
Note:
1. Examples are company size, user and resource distribution, various site connectivity, bandwidth, service performance, availability and scalability, data and system access patterns, network roles and responsibilities and security considerations
2. Examples are currently available resources, services, network infrastructure, protocols and hosts, Transmission Control Protocol and Internet Protocol hardware, planned upgrades, support and network and systems management.
 

Element:

2 Design an enterprise network.

Performance Criteria:

2.1 Knowledge and complexities of alternative network infrastructures and currently available technologies are applied to network design. (See Note 3)
2.2 Network design is developed to incorporate all required Wide Area Network (WAN) infrastructure, Internet connectivity and implementation and management strategies.
2.3 Risk management strategies are sought and obtained for incorporating into the network design.
2.4 Network design is reviewed against all inputs and adjusted to rectify any anomalies.
2.5 Network design proposal is documented in accordance with organisation policies and procedures.
2.6 Network design is presented and discussed with person(s) of higher authority.
2.7 Alterations to the network design resulting from the presentation/discussion are negotiated with person(s) of higher authority within the constraints of organisation’s policy.
2.8 Final design is documented and approval obtained from appropriate person(s).
Notes:
3. Examples of network infrastructure are topology, TCP/IP networking strategy, DHCP strategy, Design of name resolution services, Multi-protocol strategy and Distributed File Strategy
 

Element:

3 Implement and manage an enterprise network.

Performance Criteria:

3.1 OHS risk control measures and procedures for carrying out the work are followed.
3.2 Server and client computer hardware are installed and configured in compliance with design specifications and network industry standards. (See Note 4)
3.3 User and Group objects objects are created and group policy implemented. (Notes 5 and 6)
3.4 Directory services, data storage, shared resources Internet information services, remote access and network security are managed to ensure effective operation of the network. (Notes 7 to 11)
3.5 Approaches to issues/problems are analysed to provide most effective solutions.
3.6 Quality of work is monitored against personal performance agreement and/or established organisational or professional standards
Notes:
4. Hardware installation includes using qualified tools, driver signing options, digital signatures on driver files and systems support for legacy hardware devices.
5. Example of user and group objects are computer accounts, groups configuring accounts via a directory service, searching for objects, use of templates for creating user accounts and resetting accounts
6. Examples of group policy implementation are deploying software, updates and assigning and publishing applications.
7. Examples of directory services are publishing resources, performing searches and configuring printer objects
8. Examples of data storage are NTFS and FAT file systems such as New Technology File Systems (NTFS) and File Allocation Table (FAT), quotas, Encrypting File Systems, configuring volumes and basic and dynamic disks, file and folder permissions and compression and domain-based distributed file systems.
9. Examples of shared resources are folders, web sharing, folder permissions, printers and printer permissions.
10. Examples of Internet Information Services are virtual directories and servers, Internet and intranet browsing, authentication and Secure Sockets Layer (SSL), File Transfer Protocol (FTP) services and access permissions for intranet server
11. Examples of Network security are user account lockout settings, password management, Group Policy to run logon scripts and link objects, auditing and security log file.
 

Element:

4 Diagnose network malfunctions.

Performance Criteria:

4.1 OHS risk control measures and procedures for carrying out the work are followed.
4.2 Network operation is monitored and malfunctions are diagnosed to ascertain their cause using network diagnostic tools. (Note 12)
4.3 Network malfunctions are rectified using effective techniques and drawing knowledge of network topology and complexities of network interactivity.
4.4 Approaches to issues/problems are analysed to provide most effective solutions.
4.5 Quality of work is monitored against personal performance agreement and/or established organisational or professional standards
Notes: 12. Examples of network operations are routing TCP/IP, DHCP, Domain Name Service, name resolution, starting servers, client computers, User and group objects, directory service replication problems, End-User Group Policy and remote access.
 

Element:

5 Report network management activities.

Performance Criteria:

5.1 Written justification is produced for enterprise network services solutions and forwarded to appropriate person/s in accordance with established procedures.
5.2 Network service development records are maintained in accordance with established procedures.
 


Learning Outcomes


Refer to Elements

 


Details of Learning Activities

You will be involved in the following learning activities to meet requirements for this competency and stage 1 competencies for Engineering Associates.
• Lectures
• Tutorials
• Practicals
• Review questions
• Case projects
• Lab journal


Engineers Australia Mapping Information:
This course is mapped against stage 1 competencies for Engineering Associates developed by Engineers Australia as detailed below:

EA 1.Knowledge and Skill Base

EA1.1. Comprehensive, theory based understanding of the underpinning natural and physical sciences and the engineering fundamentals applicable to the engineering
EA1.2. Conceptual understanding of the, mathematics, numerical analysis, statistics, and computer and information sciences which underpin the engineering discipline.
EA1.3. In-depth understanding of specialist bodies of knowledge within the engineering discipline.
EA1.4. Discernment of knowledge development and research directions within the engineering discipline.
EA1.5. Knowledge of contextual factors impacting the engineering discipline.
EA1.6. Understanding of the scope, principles, norms, accountabilities and bounds of contemporary engineering practice in the specific discipline.
 

EA 2.Engineering Application Ability

EA2.1. Application of established engineering methods to complex engineering problem solving.
EA2.2. Fluent application of engineering techniques, tools and resources.
EA2.3. Application of systematic engineering synthesis and design processes.
EA2.4. Application of systematic approaches to the conduct and management of engineering projects.
 

EA 3.Professional and Personal Attributes

EA3.1. Ethical conduct and professional accountability.
EA3.2. Effective oral and written communication in professional and lay domains.
EA3.3. Creative, innovative and pro-active demeanour.
EA3.4. Professional use and management of information.
EA3.5. Orderly management of self and professional conduct.
EA3.6. Effective team membership and team leadership

Engineers Australia Stage 1 Competencies are mapped with competency UEENEED114A in the Assessment Matrix.


Teaching Schedule

 The proposed teaching schedule for this competency is detailed below:

1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2

Week Topics Delivered Elements/Performance Criteria
1 Configuring Advanced Active Directory: Part 1 Lecture: Reviewing Active Directory, configuring multidomain environments, configuring multiforest environments, Active Directory trusts, configuring Active Directory trusts, upgrading domains and forests, chapter summary Lab: Activities 1-1, 1-2, 1-3, 1-4, 1-5, 1-6, 1-7, 1-8, 1-9, 1-10, 1-11

 
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
2 Configuring Advanced Active Directory: Part 2 Lecture: Understanding sites, configuring sites, Active Directory replication, chapter summary Lab: Activities 2-1, 2-2, 2-3, 2-4, 2-5, 2-6, 2-7 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
3 Advanced DHCP and DNS Configuration Lecture: An overview of DHCP, configuring superscopes and multicast scopes using DHCPv6, DHCP high availability, configuring DHCP for DNS registration Lab: Activities 3-1, 3-2, 3-3, 3-4, 3-5 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
4 Advanced DHCP and DNS Configuration cont. Lecture: Overview of DNS, configuring DNS security, configuring advanced DNS options, chapter summary Lab: Activities 3-6, 3-7, 3-8, 3-9, 3-10 reflective journal review and feedback 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
5 Configuring Advanced File Storage Solutions Lecture: Configuring advanced file services, configuring advanced file storage, chapter summary Lab: Activities 4-1, 4-2, 4-3, 4-4, 4-5, 4-6, 4-7, 4-8, 4-9 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
6 Configuring DAC and IPAM Lecture: Configuring dynamic access control, configuring IP address management, chapter summary Lab: Activities 5-1, 5-2, 5-3, 5-4, 5-5, 5-6, 5-7, 5-8, 5-9, 5-10, 5-11, 5-12, 5-13, 5-14, 5-15, 5-16, 5-17 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
7 Configuring Server High Availability Part 1 Lecture: Configuring network load balancing, failover clusters, chapter summary Lab: Activities 6-1, 6-2, 6-3, 6-4, 6-5 6-6, 6-7 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
8 Configuring Server High Availability Part 2 Lecture: Advanced failover clusters, configuring highly available virtual machines, configuring virtual machine movement, chapter summary Lab: Activities 7-1, 7-2, 7-3, 7-4 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
9 Lab: Practical Test Part A 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
10 Server and Site Disaster Recovery Lecture: Backing up Windows Servers, Windows Server Recovery Lab: Activities 8-1, 8-2, 8-3 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
11 Server and Site Disaster Recovery cont. Lecture: Configuring online backups, site-level disaster recovery, configuring multisite clustering, chapter summary Lab: Activities 8-4, 8-5 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
12 Implementing Active Directory Certificate Services Lecture: Introducing Active Directory certificate services, deploying the Active Directory certificate services role, configuring a certification authority, maintaining and managing a PKI, chapter summary Lab: Activities 9-1, 9-2, 9-3, 9-4, 9-5, 9-6, 9-7, 9-8, 9-10, 9-11 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
13 Implementing AD FS and AD RMS Lecture: Active Directory federation services Lab: Activities 10-1, 10-2, 10-3


 
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
14 Implementing AD FS and AD RMS cont. Lecture: Active Directory rights management service Lab: Activities 10-4, 10-5, 10-6 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
15 Revision and Reflective journal submission 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
16 Practical Test Part B 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2
17-18 Closed Book Test 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.1, 4.2, 4.3, 4.4, 4.5, 5.1, 5.2


Learning Resources

Prescribed Texts

MCSA Guide to Configuring Advanced Microsoft Windows Server 2012/R2 Services, Greg Tomsho

9781285863566


References


Other Resources

Students will be able to access information and learning materials through myRMIT and may be provided with additional materials in class. List of relevant reference books, resources in the library and accessible Internet sites will be provided where possible. During the course, you will be directed to websites to enhance your knowledge and understanding of difficult concepts.

Study materials will be available on myRMIT>Studies>COSC6153C

Other Resources

Oracle Virtual Box virtualisation software - available for download from https://www.virtualbox.org/wiki/Downloads
Microsoft Windows 10 Enterprise Evaluation edition - available for download from http://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise
Microsoft Windows Server 2012/R2 Up to 120-Day Evaluation - supplied with the prescribed text
External USB Hard disk storage device with minimum capacity of 500GB
 


Overview of Assessment

The assessment is conducted in both theoretical and practical aspects of the course according to the performance criteria set in the National Training Package. Assessment may incorporate a variety of methods including written/oral activities and demonstration of practical skills to the relevant industry standards. Participants are advised that they are likely to be asked to personally demonstrate their assessment activities to their teacher/assessor. Feedback will be provided throughout the course. To successfully complete this course you will be required to demonstrate competency in each assessment task detailed under Assessment Tasks:

Assessment 1: Lab Journal
Weighting towards final grade (%): 20

Assessment 2: Practical Test
Weighting towards final grade (%): 50

Assessment 3: Closed Book Test
Weighting towards final grade (%): 30

These tasks assesses the following Course Learning Outcomes (CLOs):

Assessment Mapping Matrix

Elements/Performance Criteria Lab Journal Practical Test Closed Book Test
1.1 x x x
1.2 x   x
1.3 x x x
1.4 x x x
1.5 x   x
1.6 x x x
1.7   x x
1.8 x x x
1.9 x x x
1.1 x x x
2.1   x x
2.2 x x x
2.3 x x x
2.4 x x x
2.5 x x x
2.6 x x x
2.7 x x x
2.8   x x
3.1   x x
3.2 x x x
3.3 x x x
3.4 x x x
3.5 x x x
3.6 x x x
4.1 x x x
4.2 x x x
4.3 x x x
4.4 x x x
4.5 x x x
5.1 x x x
5.2   x x


Assessment Tasks

Assessment 1: Lab Journal
Weighting towards final grade (%): 20%

Assessment 2: Practical Test
Weighting towards final grade (%): 40%

Assessment 3: Closed Book Test
Weighting towards final grade (%): 40%
 

This course is graded as Competent or Not Yet Competent and subsequently the following course grades are allocated:

80 - 100: CHD - Competent with High Distinction
70 - 79: CDI - Competent with Distinction
60 - 69: CC - Competent with Credit
50 - 59: CAG - Competency Achieved - Graded
0 - 49: NYC - Not Yet Competent
DNS - Did Not Submit for Assessment.
 


Assessment Matrix

Assessment vs UEENEED114A Elements & Performance Criteria

  UEENEED114A Elements & Performance Criteria
Assessments 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 3.1 3.2 3.3 3.4 3.5 3.6 4.1 4.2 4.3 4.4 4.5 5.1 5.2
Lab Journal x x x  x  x x   x x x   x  x  x  x  x  x      x  x x x x x x x x x x  
Practical Test x   x x   x x x x x x x x x x x x x x x x x x x x x x x x x x
Closed Book Test x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x

Assessment vs Engineers Australia Stage 1 Competencies

  Engineers Australia Stage 1 Competencies
 Assessments EA1.1 EA1.2 EA1.3 EA1.4 EA1.5 EA1.6 EA2.1 EA2.2 EA2.3 EA2.4 EA3.1 EA3.2 EA3.3 EA3.4 EA3.5 EA3.6
Lab Journal  X   X X X   X X     X X X X X  
Practical Test     X X X    X X  X    X  X  X  X X  X
Closed Book Test      X   X   X X  X     X      X  X
All Assessments

UEENEED114A
 

1 0 3 2 3 0 3 3 2 0 2 3 2 2 3 2
0 (Blank) Graduate attribute is not assessed.
1 Graduate attribute is assessed in at least one, but less than one-third, of the Element
2 Graduate attribute is assessed in at least one third, but less than two-thirds, of the Element
3 Graduate attribute is assessed in more than two-thirds of the Element

Other Information

• Student directed hours involve completing activities such as reading online resources, assignments, individual student-teacher course-related consultation. Students are required to self-study the learning materials and complete the assigned out of class activities for the scheduled non-teaching hours. The estimated time is 20 hours outside the class time.

Credit Transfer and/or Recognition of Prior Learning (RPL):
You may be eligible for credit towards courses in your program if you have already met the learning/competency outcomes through previous learning and/or industry experience. To be eligible for credit towards a course, you must demonstrate that you have already completed learning and/or gained industry experience that is:

• Relevant
• Current
• Satisfies the learning/competency outcomes of the course

Please refer to http://www.rmit.edu.au/students/enrolment/credit to find more information about credit transfer and RPL.

Study and Learning Support:
Study and Learning Centre (SLC) provides free learning and academic development advice to you. Services offered by SLC to support your numeracy and literacy skills are:
• Assignment writing, thesis writing and study skills advice
• Maths and science developmental support and advice
• English language development

Please refer to http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and Learning Support.

Disability Liaison Unit:
If you are suffering from long-term medical condition or disability, you should contact Disability Liaison Unit to seek advice and support to complete your studies.
Please refer to http://www.rmit.edu.au/disability to find more information about services offered by Disability Liaison Unit.

Late Submission:
If you require an Extension of Submittable Work (assignments, reports or project work etc.) for seven calendar days or less (from the original due date) and have valid reasons, you must complete an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager.
The application must be lodged no later than one working day before the official due date. You will be notified within no more than two working days of the date of lodgement as to whether the extension has been granted.
If you seek an Extension of Submittable Work for more than seven calendar days (from the original due date), you must lodge an Application for Special Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than two working days after the official due date.

Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or marked.

Special Consideration:
Please refer to http://www.rmit.edu.au/students/specialconsideration to find more information about special consideration.

Plagiarism:
Plagiarism is a form of cheating and it is very serious academic offence that may lead to expulsion from the university.
Please refer to http://www.rmit.edu.au/academicintegrity to find more information about plagiarism.

Email Communication:
All email communications will be sent to your RMIT email address and you must regularly check your RMIT emails.

Course Overview: Access Course Overview