Course Title: Test concepts and procedures for cyber security

Part A: Course Overview

Program: C4408 Certificate IV in Cyber Security

Course Title: Test concepts and procedures for cyber security

Portfolio: Vocational Education

Nominal Hours: 60

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

COSC6235

City Campus

TAFE

174T School of VE Engineering, Health & Science

Face-to-Face or Internet

Term2 2021

COSC6235

City Campus

TAFE

520T Future Technologies

Face-to-Face or Internet

Term2 2022

Course Contact: Luke Eberbach

Course Contact Phone: +61 3 9925 4381

Course Contact Email: luke.eberbach@rmit.edu.au



Course Description

This unit provides introductory skills and knowledge required to implement testing procedures for systems in an organisation. These involve application layer testing tools as defined by the Open Web Application Security Project (OWASP), network testing and monitoring tools. The unit examines common threats, ethical hacking principles and introduction to penetration testing, social engineering security issues, enumeration, port scanning, sniffers, footprinting, traffic sniffers and wireless LAN vulnerabilities and contains a solid treatment of intrusions.

Pre-requisite Courses and Assumed Knowledge and Capabilities

NIL



National Competency Codes and Titles

National Element Code & Title:

VU21989 Test concepts and procedures for cyber security

Elements:

1.Identify typical cyber security application layer testing methodologies and tools

2.Use networking security testing methodologies, tools and commands

3.Implement the lab testing environment

4.Identify common threats and mitigation strategies

5.Demonstrate ethical hacking principles and procedures

6.Identify security vulnerabilities of Wireless LANs (WLANs)

7.Demonstrate basic scripting for a cyber security environment


Learning Outcomes

Refer to Elements


Overview of Assessment

Assessment 1: Practical Assessment
Assessment 2: Cybersecurity Report

These tasks assesses the following Course Learning Outcomes (CLOs):

Assessment Mapping Matrix

Elements/Performance Criteria

Assessment 1

Assessment 2

1.1

X

X

1.2 

X

X

1.3

X

X

2.1 

x


2.2 

X


2.3

X


3.1 

X


3.2 

X


4.1

X

X

4.2

X

X

4.3

X

X

4.4

X

X

4.5

X

X

4.6

X

X

5.1

X

X

5.2

X

X

5.3

X

X

5.4

X

X

5.5

X

X

5.6

X

X

5.7

X

X

5.8

X

X

5.9

X

X

6.1

X

X

6.2

X

X

7.1

X

X

7.2

X

X

7.3

X

X

7.4

X

X