Course Title: Test concepts and procedures for cyber security
Part A: Course Overview
Program: C4408 Certificate IV in Cyber Security
Course Title: Test concepts and procedures for cyber security
Portfolio: Vocational Education
Nominal Hours: 60
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
COSC6235 |
City Campus |
TAFE |
174T School of VE Engineering, Health & Science |
Face-to-Face or Internet |
Term2 2021 |
COSC6235 |
City Campus |
TAFE |
520T Future Technologies |
Face-to-Face or Internet |
Term2 2022 |
Course Contact: Luke Eberbach
Course Contact Phone: +61 3 9925 4381
Course Contact Email: luke.eberbach@rmit.edu.au
Course Description
This unit provides introductory skills and knowledge required to implement testing procedures for systems in an organisation. These involve application layer testing tools as defined by the Open Web Application Security Project (OWASP), network testing and monitoring tools. The unit examines common threats, ethical hacking principles and introduction to penetration testing, social engineering security issues, enumeration, port scanning, sniffers, footprinting, traffic sniffers and wireless LAN vulnerabilities and contains a solid treatment of intrusions.
Pre-requisite Courses and Assumed Knowledge and Capabilities
NIL
National Competency Codes and Titles
National Element Code & Title: |
VU21989 Test concepts and procedures for cyber security |
Elements: |
1.Identify typical cyber security application layer testing methodologies and tools 2.Use networking security testing methodologies, tools and commands 3.Implement the lab testing environment 4.Identify common threats and mitigation strategies 5.Demonstrate ethical hacking principles and procedures 6.Identify security vulnerabilities of Wireless LANs (WLANs) 7.Demonstrate basic scripting for a cyber security environment |
Learning Outcomes
Refer to Elements
Overview of Assessment
Assessment 1: Practical Assessment
Assessment 2: Cybersecurity Report
These tasks assesses the following Course Learning Outcomes (CLOs):
Assessment Mapping Matrix
Elements/Performance Criteria |
Assessment 1 |
Assessment 2 |
1.1 |
X |
X |
1.2 |
X |
X |
1.3 |
X |
X |
2.1 |
x |
|
2.2 |
X |
|
2.3 |
X |
|
3.1 |
X |
|
3.2 |
X |
|
4.1 |
X |
X |
4.2 |
X |
X |
4.3 |
X |
X |
4.4 |
X |
X |
4.5 |
X |
X |
4.6 |
X |
X |
5.1 |
X |
X |
5.2 |
X |
X |
5.3 |
X |
X |
5.4 |
X |
X |
5.5 |
X |
X |
5.6 |
X |
X |
5.7 |
X |
X |
5.8 |
X |
X |
5.9 |
X |
X |
6.1 |
X |
X |
6.2 |
X |
X |
7.1 |
X |
X |
7.2 |
X |
X |
7.3 |
X |
X |
7.4 |
X |
X |