Course Title: Cyber Security

Part A: Course Overview

Course Title: Cyber Security

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2557

City Campus

Undergraduate

174T School of VE Engineering, Health & Science

Face-to-Face

Sem 1 2020,
Sem 2 2020

INTE2557

City Campus

Undergraduate

520T Future Technologies

Face-to-Face

Sem 2 2022,
Sem 1 2023,
Sem 1 2024

Course Coordinator: Jay Polandaya

Course Coordinator Phone: +61 3 9925 6153

Course Coordinator Email: jay.polandaya@rmit.edu.au

Course Coordinator Location: 057.05.036

Course Coordinator Availability: By appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

Assumed Knowledge and Capabilities: Students should be familiar with the Microsoft Windows and Linux operating systems


Course Description

This course provides students with a fundamental understanding of common cybersecurity threats, vulnerabilities and risks. An overview of how basic cyber-attacks are constructed and applied to real systems is covered, and the course also includes an introduction to basic cyber security risk analysis with an overview of how threat-asset matrices can be used to prioritise risk decisions. Threats, vulnerabilities and attacks are examined and mapped in the context of system security engineering methodologies.


Objectives/Learning Outcomes/Capability Development

This course contributes to the following Program Learning Outcomes for AD006 Associate Degree in Information Technology:

  1. Enabling knowledge: This is the understanding of appropriate and relevant fundamental and applied scientific knowledge with the ability to use and apply that knowledge in a wide range of situations, including new situations within the professional discipline. The vocational emphasis of this program ensures that the knowledge acquired has practical applications that will be experienced in the simulated workplace setting of the laboratory.
  2. Critical analysis:
  • Examine and consider accurately and objectively any topic, evidence, or situation.
  • Analyse and model requirements and constraints for the purpose of designing and implementing Information Technology systems.
  • Evaluate and compare designs of such systems on the basis of requirements of the organisational needs.
  1. Problem Solving:
  • Analyse problems and synthesise suitable solutions.
  • Design and implement Information Technology systems that accommodate specified requirements and constraints, based on analysis or requirements specification.
  1. Responsibility:
  • Accepting responsibility for one's own learning and make informed decisions in judging and adopting appropriate behaviour in professional and social situations.
  • Effectively apply relevant standards, ethical considerations, and an understanding of legal and privacy issues to designing IT systems.


On completion of this course you should be able to:

  1. Describe the role of the Cybersecurity Operational Analyst
  2. Compare the Microsoft Windows and Linux operating system roles, features and characteristics needed to support cybersecurity analysis
  3. Demonstrate the operation of network protocols and services and configure network infrastructure components
  4. Utilise network monitoring tools to evaluate and classify network attacks and recommend appropriate methods to protect the network
  5. Discuss cryptography techniques and demonstrate an understanding of network security monitoring
  6. Analyse intrusion data and select the most appropriate incident response


Overview of Learning Activities

Learning activities will be a combination of lectures, tutorials and practical laboratory activities. Attendance in lectures and tutorials/labs is important, and students will be expected to conduct allocated reading tasks outside the classroom. A number of quizzes will be available during the semester which are not assessed and do not contribute to course completion but are used to provide feedback to students and assist in preparation for theory assessments.


Overview of Learning Resources

Course information and learning materials will be available on Canvas in addition to the Cisco Networking Academy website (https://www.netacad.com). Tutorial/laboratory classes will be conducted in computer labs and all lab equipment and relevant software will be provided. Students are advised to log in to Canvas regularly to check announcement and to check their RMIT student account daily.

RMIT Library Subject Guide: http://rmit.libguides.com/computer


Overview of Assessment

This course has no hurdle assessments.

Students will be eligible for a Certificate of Competition from the Cisco Networking Academy if a score of 70% or higher is achieved on the final online examination.

 

Assessment 1: Mid Semester Theory Test

Weighting towards final grade: 20%

This task assesses the following program and course learning outcomes:

PLO: 1, 2, 6

CLO: 1, 2, 3

Assessment 2: Part A - Skills & Labs Test

Weighting towards final grade: 30%

This task assesses the following program and course learning outcomes:

PLO: 2, 3, 4, 6

CLO: 1, 2, 3, 4, 5, 6

Assessment 3: Part B _ Skills & Labs Test

Weighting towards final grade: 30%

This task assesses the following program and course learning outcomes:

PLO: 1, 2, 3, 4

CLO: 1, 2, 3, 4, 5, 6

Assessment 4: Final Theory Test

Weighting towards final grade: 20%

This task assesses the following program and course learning outcomes:

PLO: 1, 2, 6

CLO: 4, 5, 6