Part A: Course Overview

Course Title: Security Testing

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2547

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 2 2021

INTE2547

City Campus

Undergraduate

175H Computing Technologies

Face-to-Face

Sem 2 2022,
Sem 2 2023,
Sem 2 2024

Course Coordinator: Dr. Maggie Liu

Course Coordinator Phone: by email

Course Coordinator Email: xiaoning.liu@rmit.edu.au

Course Coordinator Location: 014.11.026

Course Coordinator Availability: By appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

Enforced Pre-requisite courses

Successful completion of:

AND

Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.

For your information go to RMIT Course Requisites webpage.

 

If you have completed prior studies at RMIT or another institution that developed the skills and knowledge covered in the above course/s you may be eligible to apply for credit transfer.

Alternatively, if you have prior relevant work experience that developed the skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.

Please follow the link for further information on how to apply for credit for prior study or experience.


Course Description

The main objective of this course is for students to acquire the tools and techniques necessary to perform practical security testing in various areas. Students are provided with a range of practical exercises and tasks to reinforce their skills including: Monitoring Internet traffic, testing of secure applications, identification of vulnerabilities in networked and mobile/wireless applications. In addition, students will learn input validation techniques to minimise security risks, man-in-the-middle attack techniques to be able to build more secure networked applications, practical secure software testing techniques to be able to test applications for security bugs.


Objectives/Learning Outcomes/Capability Development

Program Learning Outcomes

This course contributes to the program learning outcomes for the following program(s):

BP355 - Bachelor of Cyber Security
BP356 - Bachelor of Cyber Security (Professional)
Major - Cyber Security

  • BP094P23 - Bachelor of Computer Science
  • BP340P23 - Bachelor of Data Science
  • BP162O - Bachelor of Information Technology (RMITO)
  • BP162P23 - Bachelor of Information Technology
  • BP349 - Bachelor of Information Technology (Professional)
  • BP347 - Bachelor of Computer Science (Professional)
  • BP348 - Bachelor of Data Science (Professional)

PLO 1    Knowledge - Apply a broad and coherent set of knowledge and skills for developing data driven solutions for contemporary societal challenges.
PLO 2    Problem Solving - Apply systematic problem solving and decision making methodologies to identify, design and implement data driven solutions to real world problems, demonstrating the ability to work independently to self-manage processes and projects
PLO 4    Communication - Communicate effectively with diverse audiences, employing a range of communication methods in interactions.to both computing and non computing personnel.

For more information on the program learning outcomes for your program, please see the program guide.


On successful completion of this course you should be able to:

  1. Investigate methods that are appropriate for the realisation security testing in software, web, network and systems;
  2. Investigate and model the possible vulnerabilities and threats for a given application system;
  3. Design, implement test procedures and perform post-testing evaluation   
  4. Analyse and evaluate security related scenarios  


Overview of Learning Activities

The learning activities included in this course are one hour lectorial plus two hour lab-tute each week over 12 weeks:

  • key concepts are given on Canvas; Lectorial enables Q&A and further discussions; tools and software used will be demonstrated in the lab-tute;
  • labs focused on practice which allow exploration of security loopholes, and give feedback on your progress and understanding;
  • assignments, as described in Overview of Assessment (below), requiring an integrated understanding of the subject matter; and private study, working through the course as presented in classes and learning materials, and gaining practice at solving conceptual and technical problems.


Overview of Learning Resources

You will make extensive use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through Canvas. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

Use the RMIT Bookshop’s textbook list search page to find any recommended textbook(s).


Overview of Assessment

This course has no hurdle requirements.

Assessment Tasks:

Assessment Task 1: Assignment 1 - Network Security
Weighting 30%
This assessment task supports CLOs 1, 2 & 3

Assessment Task 2: Assignment 2 - Testing Techniques
Weighting 40%
This assessment task supports CLO 1, 3 & 4

Assessment Task 3: Assignment 3 - Presentation and Report 
Weighting 30%
This assessment task supports CLO 2, 3 & 4 

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.