Course Title: Practical Cybersecurity for Business

Part A: Course Overview

Course Title: Practical Cybersecurity for Business

Credit Points: 12.00

Important Information:

Course Title Amendment
2024 Practical Cybersecurity for Business
2023 ICT Information Systems Security


Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2403

City Campus

Undergraduate

620H Business IT and Logistics

Face-to-Face

Sem 2 2007,
Sem 2 2008,
Sem 2 2009,
Sem 2 2010,
Summer2011,
Summer2012,
Sem 2 2019,
Sem 2 2020,
Sem 2 2021

INTE2403

City Campus

Undergraduate

665H Accounting, Information Systems and Supply Chain

Face-to-Face

Sem 2 2022,
Sem 2 2023

Course Coordinator: Dr Shahriar Kaisar

Course Coordinator Phone: +61 3 9925 7499

Course Coordinator Email: shahriar.kaisar@rmit.edu.au

Course Coordinator Location: Building 80, City Campus

Course Coordinator Availability: via email


Pre-requisite Courses and Assumed Knowledge and Capabilities

None


Course Description

This course seeks to introduce students to the technical aspects of Information Systems (IS) security in the context of the modern enterprise. It builds on the students’ growing knowledge and experience of business to provide the background to the serious issues surrounding IS security. This course will bring students up to date with the latest IS threats to enterprises, their identification and management, and ultimately, mitigation and countermeasures.


Objectives/Learning Outcomes/Capability Development

-


At the conclusion of this course, you should be able to:

CLO1 Investigate relevant information sources of Information Systems (IS) security threats and communicate individual/team research findings.

CLO2 Analyse the economic impacts of IS security threats on enterprises.

CLO3 Outline the technologies that allow IS security threats to be perpetrated.

CLO4 Develop a set of technical and business skills to address malicious IS security threats.

CLO5 Design a risk mitigation policy, that considers the ethical and legal constraints associated with businesses protecting against malicious cyber attacks.


Overview of Learning Activities

This course requires students to participate in various learning activities. These activities comprise the following:

  • Attendance at and participation in lectures.
  • Directed Internet-based research on current issues.
  • Laboratory classes designed to supplement theoretical knowledge and to allow students the rich learning experience of a practical nature.


Overview of Learning Resources

Various learning resources are available online through MyRMIT Studies\Canvas. The lecture notes and workshop notes are posted on Canvas.

Resources are also available online through RMIT Library databases and other facilities. Visit the RMIT library website for further details. Assistance is available online via our chat and email services, face to face at our campus libraries or via the telephone on (03) 9925 2020.

Additional resources and/or sources to assist your learning will be identified by your course coordinator and will be made available to you as required during the teaching period.


Overview of Assessment

The assessment tasks, their weighting and the course learning outcomes to which they are aligned are as follows:

Assessment Task 1: 20%

Linked CLOs: 1, 2, 3

Assessment Task 2: 40%

Linked CLOs: 1, 3, 4

Assessment Task 3: 40%

Linked CLOs: 1, 3, 4, 5

Feedback will be provided throughout the semester in class and/or in online forums through individual and group feedback on practical exercises and by individual consultation.