Course Title: Secure a networked personal computer
Part B: Course Detail
Teaching Period: Term2 2022
Course Code: COSC6239
Course Title: Secure a networked personal computer
Important Information:
Please note that this course may have compulsory in-person attendance requirements for some teaching activities.
To participate in any RMIT course in-person activities or assessment, you will need to comply with RMIT vaccination requirements which are applicable during the duration of the course. This RMIT requirement includes being vaccinated against COVID-19 or holding a valid medical exemption.
Please read this RMIT Enrolment Procedure as it has important information regarding COVID vaccination and your study at RMIT: https://policies.rmit.edu.au/document/view.php?id=209.
Please read the Student website for additional requirements of in-person attendance: https://www.rmit.edu.au/covid/coming-to-campus
Please check your Canvas course shell closer to when the course starts to see if this course requires mandatory in-person attendance. The delivery method of the course might have to change quickly in response to changes in the local state/national directive regarding in-person course attendance.
School: 520T Future Technologies
Campus: City Campus
Program: C4408 - Certificate IV in Cyber Security
Course Contact: Luke Eberbach
Course Contact Phone: +61 3 9925 4381
Course Contact Email: luke.eberbach@rmit.edu.au
Name and Contact Details of All Other Relevant Staff
Radhu Punchanathan
+61 3 99251409
radhu.punchanathan@rmit.edu.au
Nominal Hours: 60
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.
Pre-requisites and Co-requisites
NIL
Course Description
This unit provides base level skills and knowledge to configure an operating system on a personal computer, adding security, setting user level passwords and privileges to limit and identify user access – all required to increase protection of the end point from cyber security attacks. The unit also provides an overview of internet of things (IOT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.
National Codes, Titles, Elements and Performance Criteria
National Element Code & Title: |
VU21993 Secure a networked personal computer |
Element: |
1.Identify the role of personal computers and other computing devices in cyber security |
Performance Criteria: |
1.1 Computer system components are identified and how they work together is explained. |
Element: |
2.Undertake preventative maintenance and base level troubleshooting procedures for a computer |
Performance Criteria: |
2.1 Preventative maintenance procedures for a personal computer are described and demonstrated |
Element: |
3.Configure and use a computer operating system and relevant applications |
Performance Criteria: |
3.1 Operating system (OS) installation is performed |
Element: |
4.Configure and use virtualised images |
Performance Criteria: |
4.1 Environmental requirements for installing the virtualisation software are reviewed |
Element: |
5.Identify key concepts in networking |
Performance Criteria: |
5.1 Key components of a computer network are identified |
Element: |
6.Connect devices to networks |
Performance Criteria: |
6.1 Process of connecting a computer to a wired and wireless network is demonstrated |
Element: |
7.Demonstrate base level Linux commands |
Performance Criteria: |
7.1 Structure and characteristics of the Linux operating system environment are defined |
Learning Outcomes
Refer to Elements
Details of Learning Activities
This unit provides base level skills and knowledge to configure an operating system on a personal computer, adding security, setting user level passwords and privileges to limit and identify user access – all required to increase protection of the end point from cyber security attacks. The unit also provides an overview of internet of things (IOT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.
Teaching Schedule
Semester 2 2022 | |||
Week |
Date |
Topics Delivered |
Assessment |
1 |
4-10 Jul |
Understanding hardware peripherals. |
|
2 |
11-17 Jul |
Installation of Windows OS. Installing and configuring virtualization software. |
|
3 |
18-24 Jul |
Setting up BitLocker. |
|
4 |
25-31 Jul |
Installation of Linux OS. Configuring virtualization software |
|
5 |
1-7 Aug |
Anti-Virus and Anti-Spyware Software |
|
6 |
8-14 Aug |
Firewalls |
|
7 |
15-21 Aug |
Remote connection to a Virtual Machine. |
|
8 |
22-28 Aug |
Protected Folder Access |
|
Mid-Semester break (29 Aug to 4th Sep) | |||
9 |
5-11 Sep |
Password policies |
Task 1 - Knowledge Assessment Due |
10 |
12-18 Sep |
Basics of computer networking. Assigning IP addresses. Having devices communicating with each other. |
|
11 |
19-25 Sep |
Preventive Maintenance of Computer |
|
12 |
26 Sep-2 Oct |
Understanding what user accounts are. Define global and local user accounts. What is Parental Control. Modifying roles of the user account. |
|
13 |
3-9 Oct |
Understanding Linux basic command structure. Understanding what Linux folders represent. |
|
14 |
10-16 Oct |
Sharing folder access. |
Task 2 - Practical and Product Assessment Due |
15 |
17-23 Oct |
Project Demonstrations |
|
16 |
24-30 Oct |
Course & assessment feedback |
|
Learning Resources
Prescribed Texts
References
Other Resources
Students will need a computer that has at least 8 GB of RAM, 200 GB of hard disk and can connect to the network.
Overview of Assessment
Assessment 1: Knowledge Assessment
Assessment 2: Project
These tasks assesses the following Course Learning Outcomes (CLOs):
Assessment Mapping Matrix
Elements/Performance Criteria |
Assessment 1 |
Assessment 2 |
1.1 |
X |
|
1.2 |
X |
|
1.3 |
X |
|
1.4 |
X |
|
1.5 |
X |
|
1.6 |
X |
|
1.3 |
X |
|
2.1 |
X |
|
2.2 |
X |
|
3.1 |
X |
|
3.2 |
X |
|
3.3 |
X |
|
3.4 |
X |
|
3.5 |
X |
|
3.6 |
X |
|
3.7 |
X |
|
3.8 |
X |
|
4.1 |
X |
|
4.2 |
X |
|
4.3 |
X |
|
4.4 |
X |
|
5.1 |
X |
|
5.2 |
X |
|
5.3 |
X |
|
5.4 |
X |
|
6.1 |
X |
X |
6.2 |
X |
|
6.3 |
X |
|
6.4 |
X |
|
6.5 |
X |
|
7.1 |
X |
|
7.2 |
X |
Assessment Tasks
There are two assessments for this unit. This unit’s assessments are designed to allow the student to demonstrate their skills and knowledge in base-level skills and knowledge to configure an operating system on a personal computer, adding security, setting user-level passwords and privileges to limit and identify user access – all required to increase protection of the endpoint from cyber security attacks. The student must also provide an overview of the internet of things (IoT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.
Assessment Task 01:
This assessment covers an online knowledge assessment and comprises descriptive questions. The knowledge assessment will be undertaken by the students online outside class time on CANVAS at home or in a computer lab and will have one-hour time to complete.
Assessment Task 02:
A case study will be given to students where they will need to set up a personal computer for new staff members in a business following the businesses IT requirement and the requirements of the staff members’ position.
There will be three different activities/tasks in this assessment
Activity 1 is to prepare a report that outlines the requirements for these computers and guidelines that will be used when setting up these computers.
Activity 2 is to virtually set up one of these computers
Activity 3 is to demonstrate and explain the computer set up, maintenance and troubleshooting requirements to the staff member who will be using it.
Assessment Matrix
Course Overview: Access Course Overview