Course Title: Configure and secure networked end points
Part B: Course Detail
Teaching Period: Term1 2023
Course Code: INTE5063
Course Title: Configure and secure networked end points
School: 520T Future Technologies
Campus: City Campus
Program: C4424 - Certificate IV in Cyber Security
Course Contact: Luke Eberbach
Course Contact Phone: +61 3 9925 4381
Course Contact Email: luke.eberbach@rmit.edu.au
Name and Contact Details of All Other Relevant Staff
Nominal Hours: 60
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.
Pre-requisites and Co-requisites
None
Course Description
In this course you will gain the skills and knowledge required to configure an operating system on a personal computer, adding security, setting user level passwords and privileges to limit and identify user access – all required to increase protection of the end point from cyber security attacks.
National Codes, Titles, Elements and Performance Criteria
National Element Code & Title: |
VU23214 Configure and secure networked end points |
Element: |
1 Identify the role of personal computers and other computing devices in cyber security |
Performance Criteria: |
1.1 Computer system components are identified and how they work together is explained |
Element: |
2 Undertake preventative maintenance and base level troubleshooting procedures |
Performance Criteria: |
2.1 Preventative maintenance procedures for a personal computer are described and demonstrated |
Element: |
3 Configure and use a computer operating system and relevant applications |
Performance Criteria: |
3.1 Computer Operating System (OS) installation is performed |
Element: |
4 Define principles of safe software upgrade security practises |
Performance Criteria: |
4.1 Models of resource access for a computer system are identified |
Element: |
5 Configure and use virtualised images |
Performance Criteria: |
5.1 System requirements for installing the virtualisation software are reviewed |
Element: |
6 Identify key concepts in networking personal computers |
Performance Criteria: |
6.1 Key components of a computer network are identified |
Element: |
7 Connect devices to networks |
Performance Criteria: |
7.1 Setting the IP address in an operating system is performed |
Element: |
8 Demonstrate base level Linux commands |
Performance Criteria: |
8.1 Linux Operating system installation on a personal computer is performed |
Learning Outcomes
On successful completion of this course you will have developed and applied the skills and knowledge required to demonstrate competency in the above elements.
Details of Learning Activities
A range of learning activities are planned for this course including self-paced and collaborative classroom based activities.
The collaborative classroom based activities will include theory sessions, practical lab sessions, tutorial sessions, and out-of-class research and homework.
We expect you to participate and contribute in all scheduled learning activities.
Teaching Schedule
Week |
Date |
Topics Delivered |
Assessment |
1 |
6-12 Feb |
Understanding hardware peripherals. |
|
2 |
13-19 Feb |
Installation of Windows OS. Installing and configuring virtualization software. |
|
3 |
20-26 Feb |
Setting up BitLocker. |
|
4 |
27 Feb-5 Mar |
Installation of Linux OS. Configuring virtualization software |
|
5 |
6-12 Mar |
Anti-Virus and Anti-Spyware Software |
|
6 |
13-19 Mar |
Firewalls |
|
7 |
20-26 Mar |
Remote connection to a Virtual Machine. |
|
8 |
27 Mar-2 Apr |
Protected Folder Access |
|
9 |
3-9 Apr |
Password policies |
Task 1 - Knowledge Assessment Due |
Mid-Semester break (10-16 April) | |||
10 |
17-23 Apr |
Basics of computer networking. Assigning IP addresses. Having devices communicating with each other. |
|
11 |
24-30 Apr |
Preventive Maintenance of Computer |
|
12 |
1-7 May |
Understanding what user accounts are. Define global and local user accounts. What is Parental Control. Modifying roles of the user account. |
|
13 |
8-14 May |
Understanding Linux basic command structure. Understanding what Linux folders represent. |
|
14 |
15-21 May |
Sharing folder access. |
|
15 |
22-28 May |
Project Demonstrations |
Task 2 - Practical and Product Assessment Due |
16 |
29 May-4 Jun |
Course & assessment feedback |
|
Learning Resources
Prescribed Texts
References
Other Resources
Overview of Assessment
Assessment for this course is ongoing throughout the semester. Your knowledge and understanding of course content is assessed through participation in class exercises, oral/written presentations and through the application of learned skills and insights. Full assessment briefs will be provided and can be found on CANVAS
Assessment Tasks
This unit’s assessments are designed to allow you to demonstrate your skills and knowledge in base-level skills and knowledge to configure an operating system on a personal computer, adding security, setting user-level passwords and privileges to limit and identify user access – all required to increase protection of the endpoint from cyber security attacks. The student must also provide an overview of the internet of things (IoT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.
Task 1 - Knowledge Assessment
This is the first assessment task of two assessments that students must satisfactorily complete, in order to be deemed competent for this unit.
This is an online knowledge assessment comprising of descriptive questions. Students can complete the knowledge assessment outside the class time through Canvas. This is an open book assessment. Students need to successfully complete all the questions in this knowledge assessment to be deemed satisfactory. This is an individual assessment and must be submitted online through CANVAS (unless otherwise instructed by the teacher).
Task 2 - Knowledge Assessment
This is the second assessment task of two assessments that students must satisfactorily complete, in order to be deemed competent for this unit.
You will be given a case study where you will be setting up personal computers for new staff members in a business following the business’s IT requirements and the requirements of the staff member’s position. This will be done in three steps.
1. Identify the requirements
2. Set up the computer
3. Demonstrate and explain the computer set up, maintenance and troubleshooting requirements to the staff member who will be using it.
Assessment Matrix
Course Overview: Access Course Overview