Course Title: Protect critical infrastructure for organisations

Part B: Course Detail

Teaching Period: Term2 2025

Course Code: INTE5054C

Course Title: Protect critical infrastructure for organisations

Important Information:

Please note that this course may include compulsory in-person attendance requirements for some or all teaching activities.

It is recommended that you check your Canvas course shell closer to the course start date for details about any mandatory in-person attendance requirements.

Please be aware that the course delivery method may need to change quickly in response to evolving course requirements. Students must maintain regular communication with their teachers to stay informed about any updates.

School: 520T Future Technologies

Campus: City Campus

Program: C5402 - Diploma of Information Technology

Course Contact: Hatim Mansor

Course Contact Phone: +61 3 9925 4612

Course Contact Email: hatim.mansor@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Nominal Hours: 40

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

None

Course Description

In this course you will gain the skills and knowledge required to analyse an organisation’s critical cyber operations and develop and implement a critical protections strategy that addresses the needs of the organisation.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

ICTCYS610 Protect critical infrastructure for organisations

Element:

1. Research critical infrastructure need for an organisation

Performance Criteria:

  • 1.1 Research organisation’s need for critical infrastructure protection and document findings according to organisational requirements
  • 1.2 Analyse organisation’s existing critical infrastructure protection plan
  • 1.3 Determine effectiveness and alignment of existing plan to organisational requirements
  • 1.4 Identify operational systems, critical assets, segmentation and legislative requirements
  • 1.5 Determine level of protection, vulnerability, risk and mitigation according to organisational requirements

Element:

2. Develop protection strategy

Performance Criteria:

  • 2.1 Consolidate research findings and map critical processes according to organisational requirements
  • 2.2 Develop and document critical infrastructure protection plan according to organisational policies and procedures
  • 2.3 Submit protection plan to required personnel and seek and respond to feedback

Element:

3. Implement protection strategy

Performance Criteria:

  • 3.1 Backup data according to organisational policies and procedures
  • 3.2 Secure devices according to protection plan and technical requirements
  • 3.3 Implement network segmentation according to protection plan and technical requirements
  • 3.4 Apply software patches according to technical requirements
  • 3.5 Implement additional protection plan requirements and asset management processes

Element:

4. Test implementation outcomes

Performance Criteria:

  • 4.1 Test deployment of protection plan according to organisational policies and procedures
  • 4.2 Obtain and analyse results according to organisational policies and procedures
  • 4.3 Determine and document additional protection methods for critical infrastructure protection
  • 4.4 Submit documentation to required personnel and seek and respond to feedback


Learning Outcomes


On successful completion of this course the candidate will demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit.


Details of Learning Activities

  • Class exercises to review discussions/lectures
  • practical demonstration in a classroom
  • Analysis of web development requirements
  • web design
  • group project
  • group discussion
  • research


Teaching Schedule

WeekDateTopicAssessment / Learning activities

Week 1:

14-18 July 2025

Introduction to Critical Infrastructure Protection

Course overview, objectives, and expectations; introduction to key concepts.

Week 2:

21-25 July 2025

Researching Organisational Needs

Hands-on activities on identifying security needs; begin researching case study.

Assessment 1 Released

Week 3:

28 July - 1 August 2025

Analysing Current Infrastructure Plans

Classroom discussion on sample protection plans; identify strengths and weaknesses.

Work on Assessment 1 (Demonstration required during class time)

Week 4:

4-8 August 2025

Legal and Operational Considerations

Discussion on legislative requirements; mapping critical assets.

Work on Assessment 1 (Demonstration required during class time)

Week 5:

11-15 August 2025

Consolidating Research

Classroom discussion on mapping critical processes; strategies for protection.

Work on Assessment 1 (Demonstration required during class time)

Week 6:

18-22 August 2025

Refining Protection Strategies

Discussing different strategic approaches, peer reviews.

Submit Assessment 1 & Assessment 2 Released (Demonstration required)

Week 7:

25-29 August 2025

Developing Protection Plans

Hands-on activities for creating protection strategies; detailed plan writing.

Work on Assessment 2 (Demonstration required during class time)



1-5 September 2025 Mid-semester break

Week 8:

8-12 September 2025

Implementation Techniques

Practical tasks on backup strategies and securing devices.

Work on Assessment 2 (Demonstration required during class time)

Week 9:

15-19 September 2025

Network Segmentation and Patch Management

Hands-on lab for network segmentation and patching.

Work on Assessment 2 (Demonstration required during class time)

Week 10: 22-26 September 2025

Testing Implementation

Data testing and log analysis exercises.

Submit Assessment 2 & Assessment 3 Released (Demonstration required)

Week 11:

29 September - 3 October 2025

Iterative Improvements and Feedback

Feedback sessions on protection plans; refinement activities.

Work on Assessment 3 (Demonstration required during class time)

Week 12:

6-10 October 2025

Emerging Threats and Additional Methods

Discussion on new protection methods and technologies.

Work on Assessment 3 (Demonstration required during class time)

Week 13:

13-17 October 2025

Advanced Security Techniques

Introduction to advanced security tools and methodologies.

Work on Assessment 3 (Demonstration required during class time)

Week 14:

20-24 October 2025

Review and Finalisation

Course summary, review of key concepts.

Work on Assessment 3 (Demonstration required during class time)

Week 15:

27-31 October 2025

Final Assessment Submission

Submit final assessments, conduct course feedback.

Submit Assessment 3 (Demonstration required during class time)

Week 16:

3-7 November 2025

Resubmission Week

Opportunity for assessment resubmissions and additional feedback.

Week 17:

10-14 November 2025 Feedback & Re-submission of Assessments (If applicable)

Week 18:

17-21 November 2025

Feedback & Re-submission of Assessments (If applicable)


Learning Resources

Prescribed Texts


References


Other Resources

The University Library has extensive resources and provides subject specialist expertise, research advice, help with referencing and support through:

The Learning Lab
https://www.rmit.edu.au/students/study-support/learning-lab

The Study Support Hub
https://www.rmit.edu.au/students/study-support/study-support-hub


Overview of Assessment

Assessment for this course is ongoing throughout the semester. Your knowledge and understanding of course content is assessed through participation in class exercises and various types of assessments.

Full assessment briefs will be provided and can be found on CANVAS.


Assessment Tasks

Students enrolled in Vocational Education and Training qualifications are assessed for Competency. To be assessed as Competent means you have consistently demonstrated the required knowledge and skills at a standard expected in the workplace.

To be assessed as Competent in this course, you will need to complete each assessment task to a satisfactory standard. You will receive feedback from the teacher at the conclusion of each assessment task.

You should refer to the assessment brief, which is available through Canvas for full assessment criteria and due dates

Assessment Task 1: Knowledge Questions

Assessment Task 2:Project assessment (Case study)

Assessment Task 3: Practical assessment


Assessment Matrix

Element

Performance criteria

Assessment

Task 1: AT 1

Assessment

Task 2: AT 2

Assessment

Task 3

1. Research critical infrastructure need for an organisation

1.1 Research organisation’s need for critical infrastructure protection and document findings according to organisational requirements

Q1, Q3

1.2 Analyse organisation’s existing critical infrastructure protection plan

Q4

1.3 Determine effectiveness and alignment of existing plan to organisational requirements

Q5

1.4 Identify operational systems, critical assets, segmentation and legislative requirements

Q6

1.5 Determine level of protection, vulnerability, risk and mitigation according to organisational requirements

Q7

2. Develop protection strategy

2.1 Consolidate research findings and map critical processes according to organisational requirements

Q1

2.2 Develop and document critical infrastructure protection plan according to organisational policies and procedures

Q2,Q3

2.3 Submit protection plan to required personnel and seek and respond to feedback

Q2

Q3

3. Implement protection strategy

3.1 Backup data according to organisational policies and procedures

3.1

3.2 Secure devices according to protection plan and technical requirements

3.2

3.3 Implement network segmentation according to protection plan and technical requirements

3.2

3.4 Apply software patches according to technical requirements

3.4

3.5 Implement additional protection plan requirements and asset management processes

Q1, 3.5

4. Test implementation outcomes

4.1 Test deployment of protection plan according to organisational policies and procedures

4.1

4.2 Obtain and analyse results according to organisational policies and procedures

4.2

4.3 Determine and document additional protection methods for critical infrastructure protection

4.3

4.4 Submit documentation to required personnel and seek and respond to feedback

Q2

4.4

Other Information

Credit Transfer and/or Recognition of Prior Learning (RPL):

You may be eligible for credit towards courses in your program if you have already met the learning/competency outcomes through previous learning and/or industry experience. To be eligible for credit towards a course, you must demonstrate that you have already completed learning and/or gained industry experience, that is:
• Relevant
• Current
• Satisfies the learning/competency outcomes of the course

Please refer to http://www.rmit.edu.au/students/enrolment/credit to find more information about credit transfer and RPL.


Study and Learning Support:

Study and Learning Centre(SLC) provides free learning and academic development advice to you. Services offered by SLC to support your numeracy and literacy skills are:
• Assignment writing, thesis writing and study skills advice
• Math and science developmental support and advice
• English language development

Please refer to http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and Learning Support.

Equitable Learning Services (ELS):

If you are suffering from a long-term medical condition or disability, you should contact Equitable Learning Services (ELS) to seek advice and support to complete your studies. Please refer to https://www.rmit.edu.au/students/support-and-facilities/student-support/equitable-learning-services to find more information about services offered by Equitable Learning Services (ELS).

Late Submission:

If you require an Extension of Submittable Work (assignments, reports or project work etc.) for seven calendar days or less (from the original due date) and have valid reasons, you must complete an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager.

The application must be lodged no later than one working day before the official due date. You will be notified within no more than two working days of the date of lodgement as to whether the extension has been granted.

If you seek an Extension of Submittable Work for more than seven calendar days (from the original due date), you must lodge an Application for Special Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than two working days after the official due date.
Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or marked.


Special Consideration:

Please refer to http://www.rmit.edu.au/students/specialconsideration to find more information about special consideration.


Plagiarism:

Plagiarism is a form of cheating, and it is a very serious academic offense that may lead to expulsion from the university.
Please refer to http://www.rmit.edu.au/academicintegrity to find more information about plagiarism.


Email Communication:

All email communications will be sent to your RMIT email address, and you must regularly check your RMIT emails.

Course Overview: Access Course Overview