Course Title: Develop a cyber security industry project

Part B: Course Detail

Teaching Period: Term1 2023

Course Code: COSC6238

Course Title: Develop a cyber security industry project

Important Information:

Please note that this course may have compulsory in-person attendance requirements for some teaching activities. 

To participate in any RMIT course in-person activities or assessment, you will need to comply with RMIT vaccination requirements which are applicable during the duration of the course. This RMIT requirement includes being vaccinated against COVID-19 or holding a valid medical exemption. 

Please read this RMIT Enrolment Procedure as it has important information regarding COVID vaccination and your study at RMIT: https://policies.rmit.edu.au/document/view.php?id=209

Please read the Student website for additional requirements of in-person attendance: https://www.rmit.edu.au/covid/coming-to-campus 

 

Please check your Canvas course shell closer to when the course starts to see if this course requires mandatory in-person attendance. The delivery method of the course might have to change quickly in response to changes in the local state/national directive regarding in-person course attendance. 

School: 520T Future Technologies

Campus: City Campus

Program: C4408 - Certificate IV in Cyber Security

Course Contact: Michael Barton

Course Contact Phone: +61 3 9925 4381

Course Contact Email: michael.barton2@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Nominal Hours: 120

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

NIL

Course Description

The purpose of this unit is to undertake a project that simulates a real cyber security environment.   The project may include using a Cyber Security Operations Centre (CSOC) sandbox or equivalent laboratory environment. This environment allows the participant to demonstrate configuring and testing of firewalls, implementing Intrusion Detection System (IDS) and evaluating and identifying any traffic anomalies. The use of Red & Blue teaming exercises to identify security breaches and apply mitigation strategies to minimise further risk should be included as part of the exercise.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

VU21992 Develop a cyber security industry project

Element:

1.Determine context of business need or problem

Performance Criteria:

1.1 Scope and system boundaries of the business problem are determined together with the problem solving methodology 1.2 Background information is gathered and development of questions appropriate to business problem are prepared 1.3 Objectives and expected outcomes to be achieved are identified and documented 1.4 Key elements for project milestones are identified 1.5 Work plan statement is developed 1.6 Documentation for substantiation is submitted to relevant person/s

Element:

2.Establish project team

Performance Criteria:

2.1 Team members for the project are selected 2.2 Individual responsibilities for each team member are defined 2.3 Team performance criteria is established 2.4 Methodology of team performance measurement is defined

Element:

3.Support the project plan development

Performance Criteria:

3.1 Process of identify tasks and resources needed to complete the project plan is determined 3.2 Schedule of project tasks including realistic timeframes and costs is prepared 3.3 Specific responsibilities to project team members are allocated 3.4 Process to manage risks and/or unexpected events that may impact upon the project objectives and/or timelines is developed

Element:

4.Evaluate the suitability of the gathered resources

Performance Criteria:

4.1 Key components required from the provided design are identified 4.2 Resources for the project are allocated 4.3 Team members familiarise themselves with the operation of the selected resources and investigate in more detail where required, for project implementation

Element:

5.Implement the provided project design

Performance Criteria:

5.1 Suitable systematic processes that implement the provided design are identified 5.2 Each section of the provided design is implemented and tested for functionality according to prescribed test procedures 5.3 Verification of end to end functionality of the design with team members input is performed 5.4 Feedback to the system designer is provided 5.5 System changes provided by the system designer are implemented 5.6 Documentation for the process is prepared such as meeting minutes, reports, email trails and presentations

Element:

6.Support the development of an implementation plan

Performance Criteria:

6.1 Implementation plan with minimal end user's disruption is developed and implemented 6.2 Where appropriate, end user training is provider

Element:

7.Review team activities and performances

Performance Criteria:

7.1 Completed technical documentation covering the scope of work is drafted and checked for accuracy 7.2 Technical documentation is submitted for approval by appropriate person/s 7.3 Technical documentation for publication is prepared, printed and distributed 8.1 Team performance against objectives is reviewed 8.2 Matters affecting policies, plans and other related issues are discussed regularly with the team 8.3 Team members input during the decision making process is sought 8.4 Proposed workplace changes and improvements to processes are determined with team members input 8.5 Individual achievement of team members is recognized 8.6 Team objectives against targets are validated

Element:

8.Support project completion and handover

Performance Criteria:

9.1 Project timeframes, scope, cost and quality expectations are evaluated 9.2 Project risks strategy is reviewed by team members 9.3 Ability of project deliverables to meet project expectations are verified 9.4 Support or maintenance documents if applicable are prepared 9.5 Where appropriate end users are trained 9.6 Final project sign-off from sponsor and key stakeholders is obtained from the client 9.7 Project is closed and experience gained and lessons learnt are documented


Learning Outcomes


Refer to Elements


Details of Learning Activities

Evidence should show competency working in a realistic environment and a variety of conditions. The candidate will have access to all tools, equipment, materials and documentation required. The candidate will be permitted to refer to any relevant workplace procedures, product and manufacturing specifications, codes, standards, manuals and reference materials.
This unit may be assessed on the job, off the job or a combination of both. Where assessment occurs off the job, then an appropriate simulation must be used where the range of conditions reflects realistic workplace situations. The competencies covered by this unit would be demonstrated by an individual working alone or as part of a team. The assessment environment should not disadvantage the candidate.

 

Evidence can be gathered in a combination of ways including:
- observation of processes and procedures
- oral and/or written questioning on required knowledge and skills
- testimony from supervisors, colleagues, clients and/or other appropriate persons
- inspection of the final product or outcome
- portfolio of documented evidence.
Where performance is not directly observed and/or is required to be demonstrated over a period of time and/or in a number of locations, any evidence should be authenticated by colleagues, supervisors, clients or other appropriate persons.


Teaching Schedule

1

Introduction to Installing virtual Machines

 
2

Introduction to Security Testing

 
3

Introduction to Network Scanning

Checkup

4

Introduction to Network Reconnaissance

Checkup

5

Introduction to Application layer attacks

Checkup

6

Introduction to Wireless Security

Checkup

7

Introduction to IPS/IDS and Firewalls

Checkup

8

Introduction to site to site VPN

Checkup

9

Introduction to Team Development and Final lab Setup

 
10

Introduction to Tender Response Fundamentals and Final lab Setup

Assessment 1 and 2 Released

11

Introduction to Assessment Day 1 and SOC Models

Assessment 1 and 2 Checkup

12

Introduction to Assessment Day 2 and Network Design

Assessment 1 and 2 Checkup

13

Introduction to Assessment Day 3 and Incident Response

Assessment 1 and 2 Checkup

14

Introduction to Assessment Day 4 and Red Blue Teams

Assessment 1 and 2 Checkup

15

 Introduction to Assessment Day 5 Threat Intelligence

Assessment 1 and 2 Due

16

Final Wrap up for assessment

 


Learning Resources

Prescribed Texts


References


Other Resources

Students are Suggestd to have a windows based computer with at least 16 gig of ram and an i5 processor or better. or have access to an intel baased apple computer.

Students will have access to cisco courses at netacad.com

Students are advised to have a 500 gigabyte ssd hard drive to store virtual machines on for use with virtualbox and vmware


Overview of Assessment

Assessment 1: Industry Project Documentation
Assessment 2: Industry Project Practical Observations

These tasks assesses the following Course Learning Outcomes (CLOs):

Assessment Mapping Matrix

Elements/Performance Criteria

Assessment 1

Assessment 2

1.1

X

 

1.2 

X

X

1.3

X

 

1.4

X

 

1.5

X

 

1.6

X

 

2.1 

X

 

2.2 

X

 

2.3

X

 

2.4

X

 

3.1 

X

 

3.2 

X

 

3.3 

X

 

3.4

X

 

4.1

X

 

4.2

X

 

4.3

X

 

5.1

x

 

5.2

X

 

5.3

X

X

5.4

X

 

5.5

X

 

5.6

X

 

6.1

X

 

6.2

X

X

7.1

X

 

7.2

X

 

7.3

X

 

8.1

X

 

8.2

 

X

8.3

X

X

8.4

X

 

8.5

X

 

8.6

X

 

9.1

X

 

9.2

X

 

9.3

X

 

9.4

X

X

9.5

 

X

9.6

X

 

9.7

X

 


Assessment Tasks

Assessment 1: Industry Project Documentation

Assessment 2: Industry Project Practical Observations


Assessment Matrix

Other Information

Credit Transfer and/or Recognition of Prior Learning (RPL):
You may be eligible for credit towards courses in your program if you have already met the learning/competency outcomes through previous learning and/or industry experience. To be eligible for credit towards a course, you must demonstrate that you have already completed learning and/or gained industry experience that is:

  • Relevant
  • Current
  • Satisfies the learning/competency outcomes of the course

Please refer to http://www.rmit.edu.au/students/enrolment/credit to find more information about credit transfer and RPL

Study and learning Support:

Study and Learning Centre (SLC) provides free learning and academic development advice to you. 
Services offered by SLC to support your numeracy and literacy skills are: 

  • assignment writing, thesis writing and study skills advice 
  • maths and science developmental support and advice 
  • English language development 

Please Refer http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and learning Support 

Equitable Learning Services (ELS):

If you are suffering from long-term medical condition or disability, you should contact Equitable Learning Services (ELS) to seek advice and support to complete your studies.
Please refer to https://www.rmit.edu.au/students/support-and-facilities/student-support/equitable-learning-services to find more information about services offered by Equitable Learning Services (ELS).

Late submission: 

If you require an Extension of Submittable Work (assignments, reports or project work etc.) for 7 calendar days or less (from the original due date) and have valid reasons, you must complete and lodge an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager. 
The application must be lodged no later than one working day before the official due date. You will be notified within no more than 2 working days of the date of lodgment as to whether the extension has been granted. 
If you seek an Extension of Submittable Work for more than 7 calendar days (from the original due date) must lodge an Application for Special Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than 2 working days after the official due date. 

Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or assessed.


Special consideration: 

Please Refer http://www.rmit.edu.au/students/specialconsideration to find more information about special consideration 

Plagiarism: 

Plagiarism is a form of cheating and it is very serious academic offence that may lead to expulsion from the University. 

Please Refer: www.rmit.edu.au/academicintegrity to find more information about plagiarism. 

Other Information: 

All email communications will be sent to your RMIT email address and you must regularly check your RMIT emails.

Course Overview: Access Course Overview