Course Title: Utilise basic network concepts and protocols required in cyber security

Part B: Course Detail

Teaching Period: Term2 2022

Course Code: COSC6234

Course Title: Utilise basic network concepts and protocols required in cyber security

Important Information:

Please note that this course may have compulsory in-person attendance requirements for some teaching activities. 

To participate in any RMIT course in-person activities or assessment, you will need to comply with RMIT vaccination requirements which are applicable during the duration of the course. This RMIT requirement includes being vaccinated against COVID-19 or holding a valid medical exemption. 

Please read this RMIT Enrolment Procedure as it has important information regarding COVID vaccination and your study at RMIT: https://policies.rmit.edu.au/document/view.php?id=209

Please read the Student website for additional requirements of in-person attendance: https://www.rmit.edu.au/covid/coming-to-campus 


Please check your Canvas course shell closer to when the course starts to see if this course requires mandatory in-person attendance. The delivery method of the course might have to change quickly in response to changes in the local state/national directive regarding in-person course attendance. 

School: 520T Future Technologies

Campus: City Campus

Program: C4408 - Certificate IV in Cyber Security

Course Contact: Luke Eberbach

Course Contact Phone: +61 3 9925 4381

Course Contact Email: luke.eberbach@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Course Coordinator: Donald Attard

Email:donald.attard@rmit.edu.au

Phone: 9925 7948

Nominal Hours: 80

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

NIL

Course Description

This unit provides a cyber security practitioner with an introduction to the skills and knowledge required to comprehend how data travels around the internet and the function and operation of protocols such as the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and devices that facilitate this data transfer. The exposure to these protocols is at an introductory level in this unit.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

VU21988 Utilise basic network concepts and protocols required in cyber security

Element:

1.Outline key network security concepts

Performance Criteria:

1.1 Networking concepts that affect cyber security in a data
network are defined
1.2 Differences between network security and cyber security
are clarified
1.3 Open System Interconnection (OSI) and the Transmission
Control Protocol (TCP)/Internet Protocol (IP) models of
data communication are defined.
1.4 Function and basic operation of protocols in the TCP/IP are
defined
1.5 Organisation’s security policy is reviewed
1.6 Business implications of cyber security breaches are
introduced

Element:

2.Define key features of the TCP/IP and OSI models

Performance Criteria:

2.1 Key protocols of the TCP/IP suite and OSI layered models
are identified and demonstrated.
2.2 Binary number system and hexadecimal number systems
are defined.
2.3 Conversions between number systems are demonstrated
2.4 Differences and commonalities between the OSI and TCP/IP
Internet Protocol models are described and demonstrated
2.5 IPv4 and IPv6 (internet protocol versions 4 & 6) addressing
schemes are demonstrated

2.6 OSI Layer 1 standards are identified
2.7 OSI Layer 2 Protocols, standards and addressing media
access control addresses (MAC) for both local area
networks (LANs) and wide area networks (WANs) are
described and demonstrated
2.8 OSI Layer 3 Routed and Routing addressing protocols are
describes and demonstrated
2.9 OSI Layer 4 Protocols and Real Time Protocols (RTP) with
particular emphasis on security vulnerabilities are defined
and demonstrated.
2.10 OSI Layer 5 to 7 protocols and networking applications are
defined and demonstrated

 

 

Element:

3.Implement and demonstrate the function and operation of key networking devices

Performance Criteria:

3.1 Physical and logical network representations of a local area
network are implemented
3.2 Function and operation of network switches are described
and implemented
3.3 Function and operation of network routers are described,
and implemented
3.4 Function and operation of a firewall is described and
demonstrated
3.5 Function and operation of a wireless access point (WAP) is
described, and implemented
3.6 End to end network troubleshooting methodologies and
commands are implemented and demonstrated.

Element:

4.Implement the components of a network security laboratory and testing environment

Performance Criteria:

4.1 Software tools for the testing environment are identified
4.2 Use of virtualisation is described and demonstrated in the
testing environment
4.3 Interconnectivity of the virtualised tools is described and
demonstrated

Element:

5.Present current examples of cyber network attacks and resources

Performance Criteria:

5.1 Example of a current distributed denial of service (DDoS)
attack is presented
5.2 Example of a current ransomware breach is presented
5.3 Useful resources that increase industry’s awareness of
cyber security awareness are identified.

 


Learning Outcomes


Refer to Elements


Details of Learning Activities

This unit provides a cyber security practitioner with an introduction to the skills and knowledge required to comprehend how data
travels around the internet and the function and operation of protocols such as the Transmission Control Protocol/Internet
Protocol (TCP/IP) suite and devices that facilitate this data transfer. The exposure to these protocols is at an introductory level in this unit.


Teaching Schedule

Topics Delivered

Elements/Performance criteria

 

OSI Layer and TCP/IP Layer

 

1.3 Open System Interconnection (OSI) and the Transmission Control Protocol (TCP)/Internet Protocol (IP) models of data communication are defined.

1.4 Function and basic operation of protocols in the TCP/IP are defined

1.5 Organisation’s security policy is reviewed

2.1 Key protocols of the TCP/IP suite and OSI layered models are identified and demonstrated.

2.4 Differences and commonalities between the OSI and TCP/IP Internet Protocol models are described and demonstrated

2.6 OSI Layer 1 standards are identified

VLANs

1.4 Function and basic operation of protocols in the TCP/IP are defined

3.1 Physical and logical network representations of a local area network are implemented

Wireless Networks

1.4 Function and basic operation of protocols in the TCP/IP are defined

3.1 Physical and logical network representations of a local area network are implemented

Learning Ubuntu and how to Protect it 3.4 Function and operation of a firewall is described and
demonstrated

Static IPv4 Routing

Dynamic IPv4 Routing

1.4 Function and basic operation of protocols in the TCP/IP are defined

1.5 Organisation’s security policy is reviewed

2.1 Key protocols of the TCP/IP suite and OSI layered models are identified and demonstrated.

 

Number System Conversion

2.2 Binary number system and hexadecimal number systems are defined.

2.3 Conversions between number systems are demonstrated

IPv4, IPv6 and ARP

Static IPv6 Routing

Dynamic IPv6 Routing

2.5 IPv4 and IPv6 (internet protocol versions 4 & 6) addressing schemes are demonstrated
Utilising Cybersecurity Tools

1.2 Differences between network security and cyber security are clarified

1.6 Business implications of cyber security breaches are
introduced

5.1 Example of a current distributed denial of service (DDoS) attack is presented

4.4 Basic use of the testing environment is demonstrated

1.1 Networking concepts that affect cyber security in a data network are defined

2.10 OSI Layer 5 to 7 protocols and networking applications are defined and demonstrated

5.2 Example of a current ransomware breach is presented

5.3 Useful resources that increase industry’s awareness of cyber security awareness are identified.

2.9 OSI Layer 4 Protocols and Real Time Protocols (RTP) with particular emphasis on security vulnerabilities are defined and demonstrated.

1.5 Organisation’s security policy is reviewed

Subnetting 2.5 IPv4 and IPv6 (internet protocol versions 4 & 6) addressing schemes are demonstrated
VLSM/Network Troubleshooting 2.5 IPv4 and IPv6 (internet protocol versions 4 & 6) addressing schemes are demonstrated
Inter-VLAN Routing

3.3 Function and operation of network routers are described, and implemented

2.8 OSI Layer 3 Routed and Routing addressing protocols are described and demonstrated

3.6 End to end network troubleshooting methodologies and commands are implemented and demonstrated.

Python Scripting

3.5 Function and operation of a wireless access point (WAP) is described, and implemented

2.5 IPv4 and IPv6 (internet protocol versions 4 & 6) addressing schemes are demonstrated

Switch Port Security

2.7 OSI Layer 2 Protocols, standards and addressing media access control addresses (MAC) for both local area
networks (LANs) and wide area networks (WANs) are
described and demonstrated

3.2 Function and operation of network switches are described and implemented

3.1 Physical and logical network representations of a local area network are implemented

Networking with IPv6 5.3 Useful resources that increase industry’s awareness of cyber security awareness are identified.

Firewall Control Testing

3.4 Function and operation of a firewall is described and
demonstrated

* Subject to Change


Learning Resources

Prescribed Texts


References


Other Resources

Students should have the following equipment:

  • USB Hard Disk
  • Laptop (Optional)


Overview of Assessment

Assessment 1: Knowledge Assessment

Assessment 2: Project

Assessment 3: Practical Assessment

These tasks assesses the following Course Learning Outcomes (CLOs):

Assessment Mapping Matrix

Elements/Performance Criteria

Assessment 1

Assessment 2

Assessment 3

1.1


X


1.2 


X


1.3 


X


1.4


X


1.5


X


1.6


X


2.1 


X

X

2.2 

X



2.3

X



2.4


X

X

2.5



X

2.6


X

X

2.7



X

2.8


X

X

2.9


X

X

2.10


X

X

3.1 


X

X

3.2 


X

X

3.3 


X

X

3.4 


X

X

3.5


X

X

3.6



X

4.1



X

4.2



X

4.3



X

4.4



X

5.1


X


5.2


X


5.3


X




Assessment Tasks

Task 1 Product Assessment
Task 2 Practical Assessment
Task 3 Knowledge Assessment


Assessment Matrix

Element

Performance criteria

Assessment task 1

Assessment task 2

Assessment task 3

 

 

Questions

Project

Practical observation







              • Outline key network security concepts

1.1 Networking concepts that affect cyber security in a data network are defined

 

X

 

1.2 Differences between network security and cyber security are clarified

 

X

 

1.3 Open System Interconnection (OSI) and the Transmission Control Protocol (TCP)/Internet Protocol (IP) models of data communication are defined.

 

X

 

1.4 Function and basic operation of protocols in the TCP/IP are defined

 

X

 

1.5 Organisation’s security policy is reviewed

 

X

 

1.6 Business implications of cyber security breaches are introduced

 

X

 

2. Define key features of the TCP/IP and OSI models

2.1 Key protocols of the TCP/IP suite and OSI layered models are identified and demonstrated.

 

X

X

2.2 Binary number system and hexadecimal number systems are defined.

X

 

 

2.3 Conversions between number systems are demonstrated

X

 

 

2.4 Differences and commonalities between the OSI and TCP/IP Internet Protocol models are described and demonstrated

 

X

X

2.5 IPv4 and IPv6 (internet protocol versions 4 & 6) addressing schemes are demonstrated

 

 

X

2.6 OSI Layer 1 standards are identified

 

X

X

2.7 OSI Layer 2 Protocols, standards and addressing media access control addresses (MAC) for both local area networks (LANs) and wide area networks (WANs) are described and demonstrated

 

 

X

2.8 OSI Layer 3 Routed and Routing addressing protocols are described and demonstrated

 

X

X

2.9 OSI Layer 4 Protocols and Real Time Protocols (RTP) with particular emphasis on security vulnerabilities are defined and demonstrated.

 

X

X

2.10 OSI Layer 5 to 7 protocols and networking applications are defined and demonstrated

 

X

X







              • Implement and demonstrate the function and operation of key networking devices

3.1 Physical and logical network representations of a local area network are implemented

 

X

X

3.2 Function and operation of network switches are described and implemented

 

X

X

3.3 Function and operation of network routers are described, and implemented

 

X

X

3.4 Function and operation of a firewall is described and demonstrated

 

X

X

3.5 Function and operation of a wireless access point (WAP) is described, and implemented

 

X

X

3.6 End to end network troubleshooting methodologies and commands are implemented and demonstrated.

 

 

X







              • Implement the components of a network security laboratory and testing environment

 

4.1 Software tools for the testing environment are identified

 

 

X

4.2 Use of virtualisation is described and demonstrated in the testing environment

 

 

X

4.3 Interconnectivity of the virtualised tools is described and demonstrated

 

 

X

4.4 Basic use of the testing environment is demonstrated

 

 

X







              • Present current examples of cyber network attacks and resources

 

5.1 Example of a current distributed denial of service (DDoS) attack is presented

 

X

 

5.2 Example of a current ransomware breach is presented

 

X

 

5.3 Useful resources that increase industry’s awareness of cyber security awareness are identified.

 

X

 

Other Information

Credit Transfer and/or Recognition of Prior Learning (RPL):
You may be eligible for credit towards courses in your program if you have already met the learning/competency outcomes through previous learning and/or industry experience. To be eligible for credit towards a course, you must demonstrate that you have already completed learning and/or gained industry experience that is:

  • Relevant
  • Current
  • Satisfies the learning/competency outcomes of the course

Please refer to http://www.rmit.edu.au/students/enrolment/credit to find more information about credit transfer and RPL

Study and learning Support:

Study and Learning Centre (SLC) provides free learning and academic development advice to you. 
Services offered by SLC to support your numeracy and literacy skills are: 

  • assignment writing, thesis writing and study skills advice 
  • maths and science developmental support and advice 
  • English language development 

Please Refer http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and learning Support 

Equitable Learning Services (ELS):

If you are suffering from long-term medical condition or disability, you should contact Equitable Learning Services (ELS) to seek advice and support to complete your studies.
Please refer to https://www.rmit.edu.au/students/support-and-facilities/student-support/equitable-learning-services to find more information about services offered by Equitable Learning Services (ELS).

Late submission: 

If you require an Extension of Submittable Work (assignments, reports or project work etc.) for 7 calendar days or less (from the original due date) and have valid reasons, you must complete and lodge an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager. 
The application must be lodged no later than one working day before the official due date. You will be notified within no more than 2 working days of the date of lodgment as to whether the extension has been granted. 
If you seek an Extension of Submittable Work for more than 7 calendar days (from the original due date) must lodge an Application for Special Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than 2 working days after the official due date. 

Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or marked. 


Special consideration: 

Please Refer http://www.rmit.edu.au/students/specialconsideration to find more information about special consideration 

Plagiarism: 

Plagiarism is a form of cheating and it is very serious academic offence that may lead to expulsion from the University. 

Please Refer: www.rmit.edu.au/academicintegrity to find more information about plagiarism. 

Other Information: 

All email communications will be sent to your RMIT email address and you must regularly check your RMIT emails.

 

Course Overview: Access Course Overview