Course Title: Cyber Security
Part A: Course Overview
Course Title: Cyber Security
Credit Points: 12.00
Important Information:
Please note that this course may have compulsory in-person attendance requirements for some teaching activities.
To participate in any RMIT course in-person activities or assessment, you will need to comply with RMIT vaccination requirements which are applicable during the duration of the course. This RMIT requirement includes being vaccinated against COVID-19 or holding a valid medical exemption.
Please read this RMIT Enrolment Procedure as it has important information regarding COVID vaccination and your study at RMIT: https://policies.rmit.edu.au/document/view.php?id=209.
Please read the Student website for additional requirements of in-person attendance: https://www.rmit.edu.au/covid/coming-to-campus
Please check your Canvas course shell closer to when the course starts to see if this course requires mandatory in-person attendance. The delivery method of the course might have to change quickly in response to changes in the local state/national directive regarding in-person course attendance.
Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE2557 |
City Campus |
Undergraduate |
174T School of VE Engineering, Health & Science |
Face-to-Face |
Sem 1 2020, Sem 2 2020 |
INTE2557 |
City Campus |
Undergraduate |
520T Future Technologies |
Face-to-Face |
Sem 2 2022, Sem 1 2023 |
Course Coordinator: Jay Polandaya
Course Coordinator Phone: +61 3 9925 6153
Course Coordinator Email: jay.polandaya@rmit.edu.au
Course Coordinator Location: 057.05.036
Pre-requisite Courses and Assumed Knowledge and Capabilities
Enforced Pre-requisites: COSC2385 Networking 1 & COSC2384 Networking 2
Assumed Knowledge and Capabilities: Students should be familiar with the Microsoft Windows and Linux operating systems
Course Description
This course provides students with a fundamental understanding of common cybersecurity threats, vulnerabilities and risks. An overview of how basic cyber-attacks are constructed and applied to real systems is covered, and the course also includes an introduction to basic cyber security risk analysis with an overview of how threat-asset matrices can be used to prioritise risk decisions. Threats, vulnerabilities and attacks are examined and mapped in the context of system security engineering methodologies.
Objectives/Learning Outcomes/Capability Development
This course contributes to the following Program Learning Outcomes for AD006 Associate Degree in Information Technology:
- Enabling knowledge: This is the understanding of appropriate and relevant fundamental and applied scientific knowledge with the ability to use and apply that knowledge in a wide range of situations, including new situations within the professional discipline. The vocational emphasis of this program ensures that the knowledge acquired has practical applications that will be experienced in the simulated workplace setting of the laboratory.
- Critical analysis:
- Examine and consider accurately and objectively any topic, evidence, or situation.
- Analyse and model requirements and constraints for the purpose of designing and implementing Information Technology systems.
- Evaluate and compare designs of such systems on the basis of requirements of the organisational needs.
- Problem Solving:
- Analyse problems and synthesise suitable solutions.
- Design and implement Information Technology systems that accommodate specified requirements and constraints, based on analysis or requirements specification.
- Responsibility:
- Accepting responsibility for one's own learning and make informed decisions in judging and adopting appropriate behaviour in professional and social situations.
- Effectively apply relevant standards, ethical considerations, and an understanding of legal and privacy issues to designing IT systems.
On completion of this course you should be able to:
- Describe the role of the Cybersecurity Operational Analyst
- Compare the Microsoft Windows and Linux operating system roles, features and characteristics needed to support cybersecurity analysis
- Demonstrate the operation of network protocols and services and configure network infrastructure components
- Utilise network monitoring tools to evaluate and classify network attacks and recommend appropriate methods to protect the network
- Discuss cryptography techniques and demonstrate an understanding of network security monitoring
- Analyse intrusion data and select the most appropriate incident response
Overview of Learning Activities
Learning activities will be a combination of lectures, tutorials and practical laboratory activities. Attendance in lectures and tutorials/labs is important, and students will be expected to conduct allocated reading tasks outside the classroom. A number of quizzes will be available during the semester which are not assessed and do not contribute to course completion but are used to provide feedback to students and assist in preparation for theory assessments.
Overview of Learning Resources
Course information and learning materials will be available on Canvas in addition to the Cisco Networking Academy website (https://www.netacad.com). Tutorial/laboratory classes will be conducted in computer labs and all lab equipment and relevant software will be provided. Students are advised to log in to Canvas regularly to check announcement and to check their RMIT student account daily.
RMIT Library Subject Guide: http://rmit.libguides.com/computer
Overview of Assessment
This course has no hurdle assessments.
Students will be eligible for a Certificate of Competition from the Cisco Networking Academy if a score of 70% or higher is achieved on the final online examination.
Assessment 1: Mid Semester Theory Test
Weighting towards final grade: 20%
This task assesses the following program and course learning outcomes:
PLO: 1, 2, 4
CLO: 1, 2, 5, 6
Assessment 2: Lab Exercises
Weighting towards final grade: 30%
This task assesses the following program and course learning outcomes:
PLO: 2, 3, 4
CLO: 3, 4, 5, 6
Assessment 3: Skills Test
Weighting towards final grade: 30%
This task assesses the following program and course learning outcomes:
PLO: 1, 2, 3
CLO: 1, 2, 3, 4, 5
Assessment 4: Final Theory Test
Weighting towards final grade: 20%
This task assesses the following program and course learning outcomes:
PLO: 1, 2, 4
CLO: 1, 2, 5, 6