Part B: Course Detail

Teaching Period: Term1 2025

Course Code: INTE5051C

Course Title: Manage network security

Important Information:

Please note that this course may include compulsory in-person attendance requirements for some or all teaching activities.

It is recommended that you check your Canvas course shell closer to the course start date for details about any mandatory in-person attendance requirements.

Please be aware that the course delivery method may need to change quickly in response to evolving course requirements. Students must maintain regular communication with their teachers to stay informed about any updates.

School: 520T Future Technologies

Campus: City Campus

Program: C5402 - Diploma of Information Technology

Course Contact: Syed Zohaib

Course Contact Phone: +61 3 9925 4612

Course Contact Email: syed.zohaib@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Course Coordinator Name: Syed Mohammad Zohaib

Email: syed.zohaib@rmit.edu.au

Nominal Hours: 80

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

None

Course Description

In this course you will gain the skills and knowledge required to implement and manage security functions throughout a network.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

ICTNWK546 Manage network security

Element:

1. Plan security design process

Performance Criteria:

1.1 Define planning phase for network security design according to organisational requirements

1.2 Define building phase for network security design according to organisational requirements

1.3 Define managing phase for network security design according to organisational requirements

Element:

2. Identify threats to network security

Performance Criteria:

2.1 Determine major threat themes to network security

2.2 Determine the potential origin of major threats according to network security design specifications

2.3 Identify industry standard common network vulnerability types

2.4 Design and document threat model according to network security design specifications

Element:

3. Analyse security risks

Performance Criteria:

3.1 Determine required elements of risk management according to network security design specifications

3.2 Identify organisational assets requiring protection

3.3 Categorise and document assets and determine their value according to organisational requirements

3.4 Determine and document risk management plan according to organisational requirements

Element:

4. Create a security design

Performance Criteria:

4.1 Determine attacker scenarios and threats according to network security design specifications

4.2 Design and document network components security measures

4.3 Develop and document security policies

4.4 Submit document to required personnel and seek and respond to feedback

Element:

5. Design security incidents response

Performance Criteria:

5.1 Design and document auditing and incidents response procedure

5.2 Submit to required personnel, seek and respond to feedback


Learning Outcomes


On successful completion of this course the candidate will demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit.


Details of Learning Activities

  • Assess Initial Knowledge (Pre-Quiz – Week 1)
    • Students must complete a Pre-Quiz in Week 1 to help the teacher evaluate their prior understanding of Network Security concepts.
  • Enhance Understanding Through Online Learning (LinkedIn Videos)
    • Each week, after attending the class, students should watch the LinkedIn Learning videos provided in Canvas to reinforce key concepts discussed during the lecture.
    • This additional resource will help clarify complex topics and provide practical insights into real-world network security management.
  • Hands-On Practical Learning (Labs in Packet Tracer)
    • After the lecture, students will perform lab exercises in Packet Tracer to apply theoretical concepts in a simulated network environment.
    • These practical activities will help develop troubleshooting, configuration, and security implementation skills.
  • Apply Learning in Assessments
    • After completing labs, students must implement their learning into assessments, ensuring they can apply security concepts in practical scenarios.
    • This step ensures that students demonstrate competency in managing network security by applying best practices and security protocols.


Teaching Schedule

The proposed teaching schedule for ICTNWK546 is detailed below: 

WeekDateTopicAssessment / Learning activities
Week 1 10/02/2025 Cybersecurity - A World of Experts and Criminals
  • Enrol in Cisco Networking Academy "Cybersecurity Essentials"
  • Tutorials
    • Watch LinkedIn video "Cybersecurity Vocabulary"
  • Pre-Course Quiz
Week 2 17/02/2025

Common Network Types / Topologies

  • Introduction to Packet Tracer (optional)
  • Labs

    • Social Engineering Techniques
    • Creating a Cyber Security World
  • Review

    • Netacad Chapter 1 Quiz.
Week 3 24/02/2025 The Cybersecurity Cube
  • Labs
    • Install a Virtual Machine on a Personal Computer
    • Exploring Authentication, Authorization, and Accounting
  • Review
    • Netacad Chapter 2 Quiz.
Week 4 03/03/2025 Planning, Building and Managing Network Security Design
  • Labs
    • Exploring File and Data Encryption
  • Tutorial
    • Watch LinkendIn video: "Implementing an Information Security Program".
  • Assessment:
    • Project 1 Release - Commence Section 1 (Due in Week 7)
Week 5 10/0/2025 Identifying and Valuing Assets
  • Assessment
    • Project 1 - Continue working on Section 2
Week 6 17/03/2025 Threat Modelling
  • Lab
    • Threat Modelling to assess risk in an IoT System
  • Assessment
    • Project 1 - Continue working on Section 3
Week 7 24/03/2025 Implement Tests and Verify Solutions
  • Optional Notes
    • ACL
    • Application of Switch Port Security
  • Tutorials (watch LinkedIn videos)
    • Managing the Network
    • Cybersecurity Awareness While Travelling
  • Assessment
    • Project 1 - Continue working on Section 4 & 5 (Due in this Week 7)
Week 8 31/03/2025 Cybersecurity Threats, Vulnerabilities, and Attacks
  • Lab
    • Detecting Threats & Vulnerability
  • Assessment
    • Knowledge Test Release - Commence Qs1 till 6 (Due in Week 11)
Week 9 07/04/2025 The Art of Protecting Secrets
  • Labs
    • Using Steganography
    • Configuring VPN Transport Mode
    • Configuring VPN Tunnel Mode
  • Assessment
    • Knowledge Test - Continue working on Qs7 - 12
  • Review
    • Netacad Chapter 4 Quiz
Week 10 14/04/2025 Network Attacks, vulnerabilities and weaknesses
  • Lab
    • Configuring WEP/WPA2 PSK/WPA2 RADIUS
  • Tutorial (watch LinkedIn video)
    • Cybersecurity Awareness: Security Overview
  • Assessment
    • Knowledge Test - Continue working on Qs13 - 18
Week 11 28/04/2025 The Art of Ensuring Integrity
  • Labs
    • Password Cracking
    • Using Digital Signatures
  • Assessment
    • Knowledge Test - Continue working on Qs19 - 23 (Due in this Week 11)
  • Review
    • Netacad Chapter 5 Quiz
Week 12 05/05/2025 Security Policies
  • Project 2 Help:
    • Identification of incoming attacks
    • Identification of threats
    • Network Verification
    • ACLs
  • Assessment
    • Project 2 Release - Commence Section 1 Tasks 1 & 2 (Due in Week 15)
Week 13 12/05/2025 Risk Management Plan
  • The Five Nines Concept (optional)
  • Labs
    • Router and Switch Redundancy
    • Router and Switch Resilience
  • Assessments
    • Project 2 - Continue working on Section 2 Task 1
  • Review
    • Netacad Chapter 6 Quiz
Week 14 19/05/2025 Incident Response Plan
  • Tutorial
    • Protecting a Cybersecurity Domain
    • Cybersecurity for IT Professionals
  • Assessment
    • Project 2 - Continue working on Section 2 Task 2
  • Review
    • Netacad Chapter 7 Quiz
Week 15 26/05/2025 Become a Cybersecurity Specialist
  • Assessment
    • Project 2 - Continue Section 2 Task 3 (Due in this Week 15)
  • Review
    • Netacad Chapter 8 Quiz
Week 16 02/06/2025 Assessments Resubmissions (If Applicable)  
Week 17 09/06/2025 Assessments Resubmissions (If Applicable)  

*Please note that this timeline is subject to change based on semester requirements. We recommend checking your Canvas course shell regularly to stay updated with the latest schedule. 

Student directed hours involve completing activities such as reading online resources, assignments, individual student/teacher course-related consultation. Students are required to self-study the learning materials and complete the assigned out of class activities for the scheduled non-teaching hours. 


Learning Resources

Prescribed Texts


References


Other Resources

We will be using Virtualisation to create different operating systems for this course.

You will be required to bring or purchase an External Hard Drive (Minimum 500GB) to complete your assessments. Without it, you will not be able to complete this course. 

It is your responsibility to have this organized by the end of week 1 at the latest.

The school computers do not allocate enough disk space for you to install Virtual Machines on your profiles.

All other resources will be provided via the Cisco Networking academy. Install latest CISCO Packet Tracer


Overview of Assessment

Assessment for this course is ongoing throughout the semester. Your knowledge and understanding of course content is assessed through participation in class exercises and various types of assessments.

Full assessment briefs will be provided and can be found on CANVAS.


Assessment Tasks

The students must complete the following assessments: 

Assessment Task 1 Project 1
Assessment Task 2 Knowledge Tests 
Assessment Task 3 Project 2


Assessment Matrix

 

Element

Performance criteria

 

 

 

 

 

Assessment Task 1: Knowledge Assessment

Assessment Task 2: Project 1

Assessment Task 3: Project 2

 

1. Plan security design process

1.1 Define planning phase for network security design according to organisational requirements

Q4a

 

 

1.2 Define building phase for network security design according to organisational requirements

Q4b

 

 

1.3 Define managing phase for network security design according to organisational requirements

Q4c

 

 

 

 

2. Identify threats to network security

2.1 Determine major threat themes to network security

 

Section 2c

 

2.2 Determine the potential origin of major threats according to network security design specifications

 

Section 2d

 

2.3 Identify industry standard common network vulnerability types

Q5a, 5b

 

 

2.4 Design and document threat model according to network security design specifications

 

Section 3

 

3. Analyse security risks

3.1 Determine required elements of risk management according to network security design specifications

 

Section 1

 

3.2 Identify organisational assets requiring protection

 

Section 2a

 

3.3 Categorise and document assets and determine their value according to organisational requirements

 

Section 2a, b, e, f

 

3.4 Determine and document risk management plan according to organisational requirements

 

 

Section 2, Task 1

4. Create a security design

 

4.1 Determine attacker scenarios and threats according to network security design specifications

 

 

Section 1, Task 1

4.2 Design and document network components security measures

 

Section 3

Section 4 a

 

4.3 Develop and document security policies

 

 

Section 1, Task 2

4.4 Submit document to required personnel and seek and respond to feedback

 

Section 4 c

 

5. Design security incidents response

 

5.1 Design and document auditing and incidents response procedure

 

 

Section 2, Task 2

5.2 Submit to required personnel, seek and respond to feedback

 

 

Section 1: Task 3a + 3b

Other Information

Credit Transfer and/or Recognition of Prior Learning (RPL): 

 You may be eligible for credit towards courses in your program if you have already met the learning/competency outcomes through previous learning and/or industry experience. To be eligible for credit towards a course, you must demonstrate that you have already completed learning and/or gained industry experience, that is:   

• Relevant 
• Current 
• Satisfies the learning/competency outcomes of the course   

To find more information about credit transfer and RPL, please refer to the following link: https://www.rmit.edu.au/students/my-course/enrolment/apply-for-credit 

  Study and Learning Support:   

RMIT University Library provides free study support services and resources to help you build your academic skills. 
 
Study and Learning Centre (SLC) provides free learning and academic development advice to you. Services offered by SLC to support your numeracy and literacy skills are:   

• Assignment writing, thesis writing and study skills advice 
• Math and science developmental support and advice 
• English language development 

To find more information about Study and Learning Support, please refer to the following link: https://www.rmit.edu.au/students/support-services/study-support   

 

Equitable Learning Services (ELS):   

The Equitable Learning Services team (ELS team) supports and creates equal opportunities for students with a disability, long-term illness and/or mental health condition. We also support primary carers.    

ELS works in partnership with students to create an Equitable Learning Plan. Your plan is tailored to you, supports your needs and establishes how RMIT can provide ongoing assistance so you can access and participate in your studies. The ELS team can assist you to manage your Equitable Learning Plan.   

To find more information about services offered by Equitable Learning Services (ELS), please refer to the following link: https://www.rmit.edu.au/students/support-services/equitable-learning 

  

Extensions and Special Consideration:    

Extensions:   

• Extensions are available for unforeseen circumstances of a short-term nature.   

• Applications must be submitted to the school at least one working day before the due date of the assessment.   

• Extensions can be approved for up to 7 days past the due date for an assessment. (Where students need an extension exceeding 7 days, they must instead apply for special consideration.)   

 

Special Consideration:   

• An application for special consideration is made in advance of an assessment wherever possible, but will normally be accepted within five working days after the assessment date. For more information, see the Special Consideration page of the RMIT website. 

Plagiarism: 

Plagiarism is a form of cheating and it is very serious academic offence that may lead to expulsion from the University. 

Please Refer: www.rmit.edu.au/academicintegrity to find more information about plagiarism. 
Communication Information: 

All email communications will be sent to your RMIT email address and you must regularly check your RMIT emails.

Course Overview: Access Course Overview