Course Title: Introduction to Cyber Security

Part A: Course Overview

Course Title: Introduction to Cyber Security

Credit Points: 12.00

Important Information:

Please note that this course may have compulsory in-person attendance requirements for some teaching activities. 

To participate in any RMIT course in-person activities or assessment, you will need to comply with RMIT vaccination requirements which are applicable during the duration of the course. This RMIT requirement includes being vaccinated against COVID-19 or holding a valid medical exemption. 

Please read this RMIT Enrolment Procedure as it has important information regarding COVID vaccination and your study at RMIT:

Please read the Student website for additional requirements of in-person attendance: 

Please check your Canvas course shell closer to when the course starts to see if this course requires mandatory in-person attendance. The delivery method of the course might have to change quickly in response to changes in the local state/national directive regarding in-person course attendance. 

Course Coordinator: Prof. Iqbal Gondal

Course Coordinator Phone: +61 3 9925 5974

Course Coordinator Email:

Course Coordinator Location: 014.11.021

Course Coordinator Availability: By Appointment

Pre-requisite Courses and Assumed Knowledge and Capabilities


Course Description

Cybercrime universally causes harm to individuals, SMEs, primes, critical infrastructure systems, and governments. As we live in the Internet era, devices connected to the Internet can be exposed to cyber threats. Cyber assurance is vital for business continuity, security of our business processes, supply chain systems and the data systems..

Cyber security is a collection of methods used to protect the integrity of network components, applications, and data from unauthorised access, alteration, or deletion. Enterprises use both cyber security and physical security to protect against unauthorised access to data centres and other computerised systems.

In this course, you will learn about cyber security practices and technologies to safeguard digital assets. Further, you will learn cyber security concepts, security design principles, concepts of risk-based cyber security, cryptography, principals of authentication, network security, cyber threats and mitigations strategies and legal/ethical aspects.

You will particularly be able to discuss concepts of firewalls, cloud security, wireless network security, email/web security, intrusion detection and malicious software.

Objectives/Learning Outcomes/Capability Development

The course will contribute to following program learning outcomes for

BP094 Bachelor of Computer Science
BP096 Bachelor of Software Engineering
BP162 Bachelor of Information Technology
BP340 Bachelor of Data Science
BP347 Bachelor of Computer Science (Professional)
BP348 Bachelor of Data Science (Professional)
BP349 Bachelor of Information Technology (Professional)

PLO1: Knowledge
Apply a broad and coherent set of knowledge and skills for developing user-centric computing solutions for contemporary societal challenges.

PLO3: Cognitive & Technical skills
Critically analyse and evaluate user requirements and design systems employing software development tools, techniques and emerging technologies.

PLO6: Responsibility and Accountability
Demonstrate integrity, ethical conduct, sustainable and culturally inclusive professional standards, including the Indigenous perspectives in designing and implementing computing solutions.

Upon successful completion of this course, you should be able to:

  • CLO 1: Describe cyber security hygiene concepts for risk based cyber assurance.
  • CLO 2: Explain cryptography and security protocols and their roles in securing the data communication and authenticating the users.
  • CLO 3: Identify and evaluate attack prevention and protection methods to safeguard networks, enterprise systems and cloud applications
  • CLO 4: Describe the design of secure systems for large enterprise applications.
  • CLO 5: Outline legal and ethical considerations for cybercrime, intellectual property, and computer ethics.

Overview of Learning Activities

This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of online lectures (recorded), lectorials and workshops.

The learning activities included in this course are:

  • key concepts will be explained in the lecture recording, while lectorials or workshop, will analyse the subject matters with demonstrations and examples.
  • tutorials and group discussions (including online forums) will focus on practical work and problem solving by exploring concepts with teaching staff and other students.
  • assignments work will require an integrated understanding of the subject matters comprising of theory and practice.
  • private study to analyse course material as presented in the classes will help students to learn cyber security issues and mitigation strategies.

Overview of Learning Resources

You will make use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through Canvas and the RMIT Student website, and may be provided with additional materials. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

Use the RMIT Bookshop textbook list search page to find recommended textbook(s).

 There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. These services can provide extra support to organise your studies, assignment planning or learning skills advice you may wish to contact the Study and Learning Centre. 

For further information, please visit the Library page on the RMIT University website and the RMIT Student website.

Overview of Assessment

Note: This course has no hurdle requirements.

Assessment Task 1: Industry-focused Security Assignment 1
Weighting: 40%
This assessment task supports CLOs 1 – 2

Assessment Task 2: Industry-focused Security Assignment 2
Weighting: 40%
This assessment task supports CLOs 3 – 5

Assessment Task 3: End-of-Semester summative Exercise
Weighting: 20%
This assessment supports CLOs 1 – 5