Course Title: Introduction to Cyber Security

Part A: Course Overview

Course Title: Introduction to Cyber Security

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2625

City Campus

Undergraduate

175H Computing Technologies

Face-to-Face

Sem 1 2024

Flexible Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2625

City Campus

Undergraduate

175H Computing Technologies

Face-to-Face

UGRDFlex23 (All)

Course Coordinator: Dr Mohammad Saidur Rahman

Course Coordinator Phone: -

Course Coordinator Email: mohammadsaidur.rahman@rmit.edu.au

Course Coordinator Location: 14.11.026

Course Coordinator Availability: contact via email


Pre-requisite Courses and Assumed Knowledge and Capabilities

None


Course Description

Cybercrime universally causes harm to individuals, SMEs, primes, critical infrastructure systems, and governments. As we live in the Internet era, devices connected to the Internet can be exposed to cyber threats. Cyber assurance is vital for business continuity, security of our business processes, supply chain systems and the data systems..

Cyber security is a collection of methods used to protect the integrity of network components, applications, and data from unauthorised access, alteration, or deletion. Enterprises use both cyber security and physical security to protect against unauthorised access to data centres and other computerised systems.

In this course, you will learn about cyber security practices and technologies to safeguard digital assets. Further, you will learn cyber security concepts, security design principles, concepts of risk-based cyber security, cryptography, principals of authentication, network security, cyber threats and mitigations strategies and legal/ethical aspects.

You will particularly be able to discuss concepts of firewalls, cloud security, wireless network security, email/web security, intrusion detection and malicious software.


Objectives/Learning Outcomes/Capability Development

This course contributes to the program learning outcomes for the following programs:

BP094 Bachelor of Computer Science
BP096 Bachelor of Software Engineering
BP162 Bachelor of Information Technology
BP340 Bachelor of Data Science
BP355 Bachelor of Cyber Security
BP347 Bachelor of Computer Science (Professional)
BP348 Bachelor of Data Science (Professional)
BP349 Bachelor of Information Technology (Professional)
BP356 Bachelor of Cyber Security (Professional)

PLO 1: Knowledge
Apply a broad and coherent set of knowledge and skillsfor developing user-centric computing solutions for contemporary societal challenges.

PLO 3: Cognitive & Technical skills
Critically analyse and evaluate user requirementsand design systems employing software development tools, techniques and emerging technologies. 

PLO 6: Responsibility and Accountability
Demonstrate integrity, ethical conduct, sustainable and culturally inclusive professional standards, including the Indigenous perspectives in designing and implementing computing solutions.

For more information on the program learning outcomes for your program, please see the program guide.  


Upon successful completion of this course, you will be able to:

  1. Describe cyber security hygiene concepts for risk based cyber assurance.
  2. Explain cryptography and security protocols and their roles in securing the data communication and authenticating the users.
  3. Identify and evaluate attack prevention and protection methods to safeguard networks, enterprise systems and cloud applications
  4. Describe the design of secure systems for large enterprise applications.
  5. Outline legal and ethical considerations for cybercrime, intellectual property, and computer ethics.


Overview of Learning Activities

You will be actively engaged in a range of learning activities such as lecture recordings, lectorials, workshops, demonstrations and examples, tutorials and group discussions (including online forums. This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of online lectures (recorded), lectorials and workshops.

You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, andthrough links and material specific to this course that is available through myRMIT Studies Course. 


Overview of Learning Resources

RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course. 

You will make use of computer laboratories and relevant software provided by the School.

There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal. 


Overview of Assessment

Note: This course has no hurdle requirements.

Assessment Task 1: Industry-focused Security Assignment 1
Weighting: 30%
This assessment task supports CLO: 1.

Assessment Task 2: Industry-focused Security Assignment 2
Weighting: 50%
This assessment task supports CLOs: 2 – 4.

Assessment Task 3: End-of-Semester summative Exercise
Weighting: 20%
This assessment supports CLOs: 1 – 5.

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.