Course Title: Implement network security infrastructure for an organisation

Part A: Course Overview

Program: C4424 Certificate IV in Cyber Security

Course Title: Implement network security infrastructure for an organisation

Portfolio: Vocational Education

Nominal Hours: 80

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE5066

City Campus

TAFE

520T Future Technologies

Face-to-Face or Internet

Term1 2024

Course Contact: Tim Bek

Course Contact Phone: +61 3 9925 1409

Course Contact Email: tim.bek@rmit.edu.au



Course Description

In this course you will gain the skills and knowledge required to recognise the key features that make up the network security for an organisation.
It required the ability to investigate threats and mitigation techniques, network security models, administration protection and user access methods, introduction to firewall setup and configuration, intrusion prevention and intrusion detection systems (IPS/IDS) and software used to protect an organisation. 

Pre-requisite Courses and Assumed Knowledge and Capabilities

VU23213 - Utilise basic network concepts and protocols required in cyber security



National Competency Codes and Titles

National Element Code & Title:

VU23218 Implement network security infrastructure for an organisation

Elements:

1 Examine the different models of security solutions for an organisation

2 Investigate methods used to authenticate users to a network

3 Investigate the operation and role of software tools to monitor traffic and security in an organisation

4 Prepare and implement a firewall

5 Investigate intrusion prevention and intrusion detection systems (IPS/IDS)

6 Examine proxy server vulnerability issues

7 Investigate wireless security access and common vulnerabilities

8 Demonstrate the fundamental operation of cryptographic systems

9 Demonstrate the fundamentals of Virtual Private Networks (VPN's)


Learning Outcomes

On successful completion of this course you will have developed and applied the skills and knowledge required to demonstrate competency in the above elements. 


Overview of Assessment

Assessment for this course is ongoing throughout the semester. Your knowledge and understanding of course content is assessed through participation in class exercises, oral/written presentations and through the application of learned skills and insights. Full assessment briefs will be provided and can be found on CANVAS.