Part A: Course Overview

Course Title: Security in Computing and Information Technology

Credit Points: 12.00


Course Coordinator: Shekhar Kalra

Course Coordinator Phone: -

Course Coordinator Email: shekhar.kalra@rmit.edu.au

Course Coordinator Availability: by appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

Enforced Pre-Requisite Courses

Successful completion of the following course/s:

Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.

For information go to RMIT Course Requisites webpage.

 

If you have completed prior studies at RMIT or another institution that developed the skills and knowledge covered in the above course/s you may be eligible to apply for credit transfer.

Alternatively, if you have prior relevant work experience that developed the skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.

Please follow the link for further information on how to apply for credit for prior study or experience.


Course Description

Security has become a focal area in IT; it has grown and evolved significantly in recent years and different areas of specialisation have emerged.

This course gives an introduction to technical aspects of security for future IT professionals, and presents the foundations. It looks at fundamental cryptographic and security mechanisms used in various areas of networked applications and computing, including operating systems, databases and other relevant applications as well as modern privacy preserving systems. The course will also introduce the fundamental discussion involving fraud detection using Machine Learning.

For computer systems that are used and relied upon in many areas of life, security has become an important aspect; availability and correct operation are essential. IT professionals working in the field need to be well acquainted with the security features of the tools and applications they use and produce. Protection of data regardless of the information they contain is a critical task, and requires expertise.


Objectives/Learning Outcomes/Capability Development

Program Learning Outcomes

This course is an option course so it is not required to contribute to the development of program learning outcomes (PLOs) though it may assist your achievement of several PLOs.

For more information on the program learning outcomes for your program, please see the program guide.


Upon successful completion of this course, you will be able to:

  1. Explain the functioning of security services in computing environments and the security issues in networked applications.
  2. Discuss and implement various types of data integrity and confidentiality mechanisms including cryptography.
  3. Describe basic system security mechanisms and protocols, such as those used in operating systems, file systems and computer networks.
  4. Analyse the overarching importance of IT security in areas such as networking, databases, operating systems, and web systems.
  5. Analyse and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing.


Overview of Learning Activities

This course is delivered in on-campus mode but aims to provide multiple modes of delivery with course materials available electronically wherever possible. Each topic (in standard on-campus mode) consists of lectorials and practicals.

You will examine and analyse program constructs and structures and their relevance to security.

You will be actively engaged in a range of learning activities such as:

  • key concepts will be explained in lectorials, classes and Canvas, where course material will be presented and the subject matter will be illustrated with demonstrations and examples
  • practicals and group discussions (including discussion boards) focused on practical work and problem solving will provide practice in the application of principles and procedures, allow exploration of concepts with teaching staff and other students
  • assignment work requires an integrated understanding of the subject matter with the application of theory to practice and coding
  • private study, working through the course as presented in classes and learning materials, and gaining practice at analysing conceptual and technical issues related to security and privacy.

You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, and through links and material specific to this course that is available through myRMIT Studies Course


Overview of Learning Resources

RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course. You will make use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through myRMIT and may be provided with additional materials. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal.

For extra support with study organisation, assignment planning or learning skills advice you may wish to contact the Study and Learning Centre: https://www.rmit.edu.au/students/support-services/study-support/consultations.


Overview of Assessment

Note: This course has no hurdle requirements.

Assessment Tasks

Assessment Task 1: Analytical Security Report
Weighting: 35%
This assessment task supports CLOs: 1 - 3

Assessment Task 2: Programming-based Security Project
Weighting: 45%
This assessment task supports CLOs: 2 - 5

Assessment Task 3: End-of-Semester in-class face-to-face timed-exercise
Weighting: 20%
This assessment task supports CLOs: 1 - 5. 

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.