Part A: Course Overview

Course Title: Cyber Security Attack Analysis and Incidence Response

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2626

City Campus

Undergraduate

175H Computing Technologies

Face-to-Face

Sem 1 2025

INTE2635

RMIT University Vietnam

Undergraduate

175H Computing Technologies

Face-to-Face

Viet1 2025

INTE2636

RMIT Vietnam Hanoi Campus

Undergraduate

175H Computing Technologies

Face-to-Face

Viet1 2025

Course Coordinator: Dr Mohammad Saidur Rahman

Course Coordinator Phone: .

Course Coordinator Email: mohammadsaidur.rahman@rmit.edu.au

Course Coordinator Location: 14.11.026

Course Coordinator Availability: Please email for appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

Enforced Pre-Requisite Courses

Successful completion of the following course/s:

Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.

For information go to RMIT Course Requisites webpage.

 

Recommended Prior Study  

You should have satisfactorily completed or received credit for the following course/s before you commence this course:

 

 

If you have completed prior studies at RMIT or another institution that developed the skills and knowledge covered in the above course/s you may be eligible to apply for credit transfer.

Alternatively, if you have prior relevant work experience that developed the skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.

Please follow the link for further information on how to apply for credit for prior study or experience.


Course Description

In today's highly connected digital world, most digital assets are accessible remotely in real time from anywhere. This increased connectivity has made cybersecurity more critical than ever. To ensure cybersecurity, it is essential to detect and respond to cyber threats promptly.

Cyber attack analysis is a process that helps us understand and investigate cyberattacks, including their origins, methods, and potential impacts. It involves examining the data and evidence left behind by a cyber attack to determine how it occurred, which vulnerabilities were exploited, and the extent of the damage.

Incident response (IR) is the organized approach an organization takes when dealing with a data breach or cyberattack. Its aim is to swiftly identify an attack, minimize its impact, contain any damage, and fix the root cause to prevent future incidents.

In this course, you will gain a comprehensive understanding of cyber threats and explore various types of attacks, such as malware, phishing, and advanced persistent threats. You'll also learn about the motives driving cyberattacks and how to spot early signs of a potential breach. Additionally, we'll cover the latest tools and techniques used in incident response, providing you with the skills to reduce damage and safeguard critical assets. Overall, mastering these strategies will enable you to effectively counter threats and protect organizations from potentially devastating cyberattacks.


Objectives/Learning Outcomes/Capability Development

This is a core course in BP355 and BP356 programs.

Also, the course is a program option course, however, will contribute to the following program learning outcomes for:

Major: Cyber Security

  • BP094P23 - Bachelor of Computer Science
  • BP347 - Bachelor of Computer Science (Professional)
  • BP162O - Bachelor of Information Technology (RMITO)
  • BP162P23 - Bachelor of Information Technology
  • BP349 - Bachelor of Information Technology (Professional)
  • BP340P23 - Bachelor of Data Science
  • BP348 - Bachelor of Data Science (Professional)

BP355 - Bachelor of Cyber Security
BP356 - Bachelor of Cyber Security (Professional)

PLO2: Problem Solving - Apply systematic problem solving and decision-making methodologies to identify, design and implement computing solutions to real world problems, demonstrating the ability to work independently to self-manage processes and projects.

PLO3: Cognitive and Technical Skill - Critically analyse and evaluate user requirements and design systems employing software development tools, techniques, and emerging technologies.

PLO6: Responsibility and Accountability - Demonstrate integrity, ethical conduct, sustainable and culturally inclusive professional standards, including First Nations knowledges and input in designing and implementing computing solutions.


Upon successful completion of this course, you should be able to:

  1. Possess a deep understanding of the evolving landscape of cyber threats in our interconnected digital world, including the motivations behind cyberattacks.
  2. Understand early warning signs of potential breaches, allowing you to take preemptive action and protect digital assets.
  3. Perform a systematic analysis of cyberattacks, enabling you to uncover their origins, methods, and potential impacts.
  4. Demonstrate the ability to critically assess and respond to cyber threats and incidents.
  5. Employ an organized and methodical approach to swiftly identify attacks, minimize their impact, and contain damage.


Overview of Learning Activities

This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of lectures and workshops.

The learning activities included in this course are:

  • Lectures where key concepts will be explained, course material will be presented, and the subject matter will be illustrated with demonstrations and examples.
  • Workshops will focus on practical work, problem-solving, and the exploration of concepts with teaching staff and other students.
  • Group discussions (including in-class and online forums) with teaching staff and other students will focus on solving problems related to lecture examples, workshop tasks, and exploration of advanced relevant concepts.
  • Assignment work will require an integrated understanding of the subject matter; and private study, working through the course as presented in classes and learning materials, and gaining practice at solving conceptual and technical problems.


Overview of Learning Resources

You will make use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through myRMIT and may be provided with additional materials. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

Use the RMIT Bookshop textbook list search page to find recommended textbook(s).

 There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. These services can provide extra support to organise your studies, assignment planning or learning skills advice you may wish to contact the Study and Learning Centre. http://www.rmit.edu.au/studyandlearningcentre 

For further information, please visit the Library page on the RMIT University website and the myRMIT student portal


Overview of Assessment

This course has no hurdle requirements.

Assessment tasks

Assessment Task 1: Industry focused Timed Assignment 1
Weighting 30%
This assessment task supports CLOs 1 - 3

Assessment Task 2: Industry focused Timed Assignment 2
Weighting 50%
This assessment task supports CLOs 3 – 5

Assessment 3: Lab exam on Cyber Attack Analysis and Incident Response Procedure
Weighting 20%
This assessment supports CLOs 1 - 5

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.