Course Title: Secure a networked personal computer

Part B: Course Detail

Teaching Period: Term1 2022

Course Code: COSC6239

Course Title: Secure a networked personal computer

School: 520T Future Technologies

Campus: City Campus

Program: C4408 - Certificate IV in Cyber Security

Course Contact: Luke Eberbach

Course Contact Phone: +61 3 9925 4381

Course Contact Email: luke.eberbach@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Radhu Punchanathan

+61 3 99251409

radhu.punchanathan@rmit.edu.au

Nominal Hours: 60

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

NIL

Course Description

This unit provides base level skills and knowledge to configure an operating system on a personal computer, adding security, setting user level passwords and privileges to limit and identify user access – all required to increase protection of the end point from cyber security attacks. The unit also provides an overview of internet of things (IOT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

VU21993 Secure a networked personal computer

Element:

1.Identify the role of personal computers and other computing devices in cyber security

Performance Criteria:

1.1 Computer system components are identified and how they work together is explained.
1.2 Identification and selection of appropriate components for a computer system are selected
1.3 Configuration of specialised computer systems is described and demonstrated
1.4 Role of security relevant peripherals is defined
1.5 Common computer input output devices are identified
1.6 Emerging Internet of Things (IOT) devices are identified and demonstrated.

Element:

2.Undertake preventative maintenance and base level troubleshooting procedures for a computer

Performance Criteria:

2.1 Preventative maintenance procedures for a personal computer are described and demonstrated
2.2 Base level troubleshooting procedures are demonstrated

Element:

3.Configure and use a computer operating system and relevant applications

Performance Criteria:

3.1 Operating system (OS) installation is performed
3.2 Operating system structure is examined
3.3 Appropriate security applications are installed and configured
3.4 Routine system management tasks with appropriate operating system tools are demonstrated
3.5 Common preventative maintenance techniques for operating systems are described and demonstrated
3.6 Configuring access controls for the workstation is described and implemented
3.7 Setting passwords and allocating privileges are described and implemented.

Element:

4.Configure and use virtualised images

Performance Criteria:

4.1 Environmental requirements for installing the virtualisation software are reviewed
4.2 Required services and ports, according to virtualisation software vendors are installed
4.3 Environmental requirements to ensure virtual machines function are configured
4.4 Remote client access to virtual machines is configured

Element:

5.Identify key concepts in networking

Performance Criteria:

5.1 Key components of a computer network are identified
5.2 Purpose and characteristics of networking standards are explained
5.3 Changing the IP address in an operating system is performed
5.4 Network connectivity between computers is configured and tested

Element:

6.Connect devices to networks

Performance Criteria:

6.1 Process of connecting a computer to a wired and wireless network is demonstrated
6.2 Purpose and characteristics of internet service provider (ISP) connection technologies are defined
6.3 Cloud concepts and network host services are examined
6.4 Preventative maintenance procedures for networks are demonstrated
6.5 Base level troubleshooting methods for networks are described and demonstrated

Element:

7.Demonstrate base level Linux commands

Performance Criteria:

7.1 Structure and characteristics of the Linux operating system environment are defined
7.2 Use of base level Linux commands is defined and demonstrated


Learning Outcomes


Refer to Elements


Details of Learning Activities

This unit provides base level skills and knowledge to configure an operating system on a personal computer, adding security, setting user level passwords and privileges to limit and identify user access – all required to increase protection of the end point from cyber security attacks. The unit also provides an overview of internet of things (IOT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.



Teaching Schedule

Week

Topics Delivered

Assessment

1

Understanding hardware peripherals.

 

2

Installation of Windows OS. Installing and configuring virtualization software.

 

3

Setting up BitLocker.

 

4

Installation of Linux OS. Configuring virtualization software

 

5

Anti-Virus and Anti-Spyware Software

 

6

Firewalls

 

7

Remote connection to a Virtual Machine.

 

8

Protected Folder Access

 

 

9

Password policies

Task 1 - Knowledge Assessment Due

10

Basics of computer networking.

Assigning IP addresses.

Having devices communicating with each other.

 

11

Preventive Maintenance of Computer (Part 1)


12

Preventive Maintenance of Computer (Part 2)


13

Understanding what user accounts are.

Define global and local user accounts.

What is Parental Control.

Modifying roles of the user account.

 

14

Understanding Linux basic command structure. Understanding what Linux folders represent.

 

15

Sharing folder access.

Task 2 - Practical and Product Assessment Due

16

Review and feedback

 


Learning Resources

Prescribed Texts


References


Other Resources

Students will need a computer that has at least 8 GB of RAM, 200 GB of hard disk and can connect to the network. 


Overview of Assessment

Assessment 1: Knowledge Assessment
Assessment 2: Project

These tasks assesses the following Course Learning Outcomes (CLOs):

Assessment Mapping Matrix

Elements/Performance Criteria

Assessment 1

Assessment 2

1.1


X

1.2 


X

1.3


X

1.4


X

1.5


X

1.6


X

1.3 


X

2.1 


X

2.2 


X

3.1 


X

3.2 


X

3.3 


X

3.4 


X

3.5


X

3.6


X

3.7


X

3.8


X

4.1


X

4.2


X

4.3


X

4.4


X

5.1


X

5.2


X

5.3


X

5.4


X

6.1

X

X

6.2


X

6.3


X

6.4


X

6.5


X

7.1


X

7.2


X


Assessment Tasks

There are two assessments for this unit. This unit’s assessments are designed to allow the student to demonstrate their skills and knowledge in base-level skills and knowledge to configure an operating system on a personal computer, adding security, setting user-level passwords and privileges to limit and identify user access – all required to increase protection of the endpoint from cyber security attacks. The student must also provide an overview of the internet of things (IoT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.

Assessment Task 01:

This assessment covers an online knowledge assessment and comprises descriptive questions. The knowledge assessment will be undertaken by the students online outside class time on CANVAS at home or in a computer lab and will have one-hour time to complete. 


Assessment Task 02:

A case study will be given to students where they will need to set up a personal computer for new staff members in a business following the businesses IT requirement and the requirements of the staff members’ position. 

There will be three different activities/tasks in this assessment

Activity 1 is to prepare a report that outlines the requirements for these computers and guidelines that will be used when setting up these computers.

Activity 2 is to virtually set up one of these computers

Activity 3 is to demonstrate and explain the computer set up, maintenance and troubleshooting requirements to the staff member who will be using it.


Assessment Matrix

Element

Performance criteria

 

 

 

 

Assessment 1

Knowledge Assessment

Assessment 2:

Product Assessment

  1. Identify the role of personal computers and other computing devices in cyber security

 

1.1 Computer system components are identified and how they work together is explained.

 

1.1

1.2 Identification and selection of appropriate components for a computer system are selected

 

1.2

1.3 Configuration of specialised computer systems is described and demonstrated

 

2.1

1.4 Role of security relevant peripherals is defined

 

1.3, 2.3

1.5 Common computer input output devices are identified

 

1.4

1.6 Emerging Internet of Things (IOT) devices are identified and demonstrated

 

1.5

  1. Undertake preventative maintenance and base level troubleshooting procedures for a computer

2.1 Preventative maintenance procedures for a personal computer are described and demonstrated

 

3.2

2.2 Base level troubleshooting procedures are demonstrated

 

3.2

  1. Configure and use a computer operating system and relevant applications

3.1 Operating system (OS) installation is performed

 

2.2

3.2 Operating system structure is examined

 

1.1, 2.1, 2.2

3.3 Appropriate security applications are installed and configured

 

2.3

3.4 Routine system management tasks with appropriate operating system tools are demonstrated

 

3.2

3.5 Common preventative maintenance techniques for operating systems are described and demonstrated

 

3.2

3.6 Configuring access controls for the workstation is described and implemented

 

1.6, 2.4

3.7 Setting passwords and allocating privileges are described and implemented

 

2.5

3.8 Basic operating system troubleshooting processes are explained and demonstrated

 

3.2

  1. Configure and use virtualised images

4.1 Environmental requirements for installing the virtualisation software are reviewed

 

1.8

4.2  Required services and ports, according to virtualisation software vendors are installed

 

1.9, 2.6

4.3 Environmental requirements to ensure virtual machines function are configured

 

1.8, 2.7

4.4 Remote client access to virtual machines is configured

 

1.8, 2.7

  1. Identify key concepts in networking

5.1 Key components of a computer network are identified

 

1.10

5.2 Purpose and characteristics of networking standards are explained

 

1.11

5.3 Changing the IP address in an operating system is performed

 

2.8

5.4 Network connectivity between computers is configured and tested

 

2.9

  1. Connect devices to networks

6.1 Process of connecting a computer to a wired and wireless network is demonstrated

12

2.10

6.2 Purpose and characteristics of internet service provider (ISP) connection technologies are defined

 

1.12

6.3 Cloud concepts and network host services are examined

 

1.12

6.4 Preventative maintenance procedures for networks are demonstrated

 

3.2

6.5 Base level troubleshooting methods for networks are described and demonstrated


3.2

  1. Demonstrate base level Linux commands

7.1 Structure and characteristics of the Linux operating system environment are defined

 


1.1

7.2 Use of base level Linux commands is defined and demonstrated


3.2

Course Overview: Access Course Overview