Course Title: Configure and secure networked end points

Part B: Course Detail

Teaching Period: Term1 2023

Course Code: INTE5063

Course Title: Configure and secure networked end points

School: 520T Future Technologies

Campus: City Campus

Program: C4424 - Certificate IV in Cyber Security

Course Contact: Luke Eberbach

Course Contact Phone: +61 3 9925 4381

Course Contact Email: luke.eberbach@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Nominal Hours: 60

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

None

Course Description

In this course you will gain the skills and knowledge required to configure an operating system on a personal computer, adding security, setting user level passwords and privileges to limit and identify user access – all required to increase protection of the end point from cyber security attacks. 


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

VU23214 Configure and secure networked end points

Element:

1 Identify the role of personal computers and other computing devices in cyber security

Performance Criteria:

1.1 Computer system components are identified and how they work together is explained
1.2 Role of security relevant peripherals is defined
1.3 Common computer input output devices are identified
1.4 Emerging Internet of Things (IOT) devices are identified and demonstrated
1.5 Security concerns for the network due to the inherent lack of security of IoT devices is identified.

Element:

2 Undertake preventative maintenance and base level troubleshooting procedures

Performance Criteria:

2.1 Preventative maintenance procedures for a personal computer are described and demonstrated
2.2 Base level troubleshooting procedures for the operation of a personal computer are demonstrated

Element:

3 Configure and use a computer operating system and relevant applications

Performance Criteria:

3.1 Computer Operating System (OS) installation is performed
3.2 Structure of the OS for a personal computer is examined and the function of the components are explained
3.3 Security applications for a personal computer are installed and configured
3.4 Routine system management tasks with appropriate operating system tools are demonstrated
3.5 Common preventative maintenance techniques for operating systems are described and demonstrated
3.6 Configuring access controls for a personal computer is described and implemented
3.7 Setting passwords and allocating privileges for the operating system are described and implemented.

Element:

4 Define principles of safe software upgrade security practises

Performance Criteria:

4.1 Models of resource access for a computer system are identified
4.2 Client/Server and Client/Client security issues are explained
4.3 Strategies for updating software for a Client/Server to minimise security risks are investigated.

Element:

5 Configure and use virtualised images

Performance Criteria:

5.1 System requirements for installing the virtualisation software are reviewed
5.2 Required services within the virtualised environment are installed
5.3 System requirements to ensure virtual machines function are configured
5.4 Remote client access to virtual machines is configured.

Element:

6 Identify key concepts in networking personal computers

Performance Criteria:

6.1 Key components of a computer network are identified
6.2 Purpose and characteristics of networking standards are explained
6.3 Changing the IP address in an operating system is performed
6.4 Network connectivity between computers is configured and tested.

Element:

7 Connect devices to networks

Performance Criteria:

7.1 Setting the IP address in an operating system is performed
7.2 Network connectivity between wired computers is configured and tested
7.3 Connectivity to an Internet Service Provider (ISP) from a wired Local Area Network (LAN) is demonstrated
7.4 Base level troubleshooting methods for wired networks are demonstrated
7.5 Network connectivity using a Wireless LAN (WLAN) is demonstrated
7.6 Connectivity to an ISP from the WLAN is demonstrated
7.7 Base level troubleshooting methods for WLAN networks are explained and demonstrated
7.8 Connectivity to an ISP from the WLAN is demonstrated.

Element:

8 Demonstrate base level Linux commands

Performance Criteria:

8.1 Linux Operating system installation on a personal computer is performed
8.2 Structure and characteristics of the Linux operating system environment are defined
8.3 Linux security applications are identified
8.4 Basic system administration using Linux commands is performed
8.5 Linux commands to enable the personal computer to communicate with other devices in a network are defined and implemented.


Learning Outcomes


On successful completion of this course you will have developed and applied the skills and knowledge required to demonstrate competency in the above elements. 


Details of Learning Activities

A range of learning activities are planned for this course including self-paced and collaborative classroom based activities.

The collaborative classroom based activities will include theory sessions, practical lab sessions, tutorial sessions, and out-of-class research and homework.

We expect you to participate and contribute in all scheduled learning activities.


Teaching Schedule

Week

Date

Topics Delivered

Assessment

1

6-12 Feb

Understanding hardware peripherals.

 

2

13-19 Feb

Installation of Windows OS. Installing and configuring virtualization software.

 

3

20-26 Feb

Setting up BitLocker.

 

4

27 Feb-5 Mar

Installation of Linux OS. Configuring virtualization software

 

5

6-12 Mar

Anti-Virus and Anti-Spyware Software

 

6

13-19 Mar

Firewalls

 

7

20-26 Mar

Remote connection to a Virtual Machine.

 

8

27 Mar-2 Apr

Protected Folder Access

 

9

3-9 Apr

Password policies

Task 1 - Knowledge Assessment Due

Mid-Semester break (10-16 April)

10

17-23 Apr

Basics of computer networking.

Assigning IP addresses.

Having devices communicating with each other.

 

11

24-30 Apr

Preventive Maintenance of Computer

 

12

1-7 May

Understanding what user accounts are.

Define global and local user accounts.

What is Parental Control.

Modifying roles of the user account.

 

13

8-14 May

Understanding Linux basic command structure. Understanding what Linux folders represent.

 

14

15-21 May

Sharing folder access.

 

15

22-28 May

Project Demonstrations

Task 2 - Practical and Product Assessment Due

16

29 May-4 Jun

Course & assessment feedback

 


Learning Resources

Prescribed Texts


References


Other Resources


Overview of Assessment

Assessment for this course is ongoing throughout the semester. Your knowledge and understanding of course content is assessed through participation in class exercises, oral/written presentations and through the application of learned skills and insights. Full assessment briefs will be provided and can be found on CANVAS


Assessment Tasks

This unit’s assessments are designed to allow you to demonstrate your skills and knowledge in base-level skills and knowledge to configure an operating system on a personal computer, adding security, setting user-level passwords and privileges to limit and identify user access – all required to increase protection of the endpoint from cyber security attacks. The student must also provide an overview of the internet of things (IoT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools. 

Task 1 - Knowledge Assessment

This is the first assessment task of two assessments that students must satisfactorily complete, in order to be deemed competent for this unit.
This is an online knowledge assessment comprising of descriptive questions. Students can complete the knowledge assessment outside the class time through Canvas. This is an open book assessment. Students need to successfully complete all the questions in this knowledge assessment to be deemed satisfactory. This is an individual assessment and must be submitted online through CANVAS (unless otherwise instructed by the teacher).

Task 2 - Knowledge Assessment

This is the second assessment task of two assessments that students must satisfactorily complete, in order to be deemed competent for this unit. 

You will be given a case study where you will be setting up personal computers for new staff members in a business following the business’s IT requirements and the requirements of the staff member’s position. This will be done in three steps.
1. Identify the requirements
2. Set up the computer
3. Demonstrate and explain the computer set up, maintenance and troubleshooting requirements to the staff member who will be using it.


Assessment Matrix

Element

Performance criteria

 

 

 

 

Assessment

      Task 1: Knowledge

Assessment

Task 2: Product

 

1 Identify the role of personal computers and other computing devices in cyber security

      

           

           

           

1.1        Computer system components are identified and how they work together is explained

 

1.1

1.2        Role of security relevant peripherals is defined

 

1.3,  2.3

1.3        Common computer input output devices are identified

 

1.4

1.4        Emerging Internet of Things (IOT) devices are identified and demonstrated

 

1.5

1.5        Security concerns for the network due to the inherent lack of security of IoT devices is identified

 

1.5

2 Undertake preventative maintenance and base level troubleshooting procedures

           

2.1        Preventative maintenance procedures for a personal computer are described and demonstrated

 

3.2

2.2        Base level troubleshooting procedures for the operation of a personal computer are demonstrated

 

3.2

3 Configure and use a computer operating system and relevant applications

           

           

           

           

           

           

3.1        Computer Operating System (OS) installation is performed

 

2.2

3.2        Structure of the OS for a personal computer is examined and the function of the components are explained

15

1.1, 2.1, 2.2

3.3        Security applications for a personal computer are installed and configured

 

2.3

3.4        Routine system management tasks with appropriate operating system tools are demonstrated

 

3.2

3.5        Common preventative maintenance techniques for operating systems are described and demonstrated

 

3.2

3.6        Configuring access controls for a personal computer is described and implemented

 

1.6, 2.4

3.7        Setting passwords and allocating privileges for the operating system are described and implemented

 

2.5

Define principles of safe software upgrade security practises

4.1        Models of resource access for a computer system are identified

Q18

 

4.2        Client/Server and Client/Client security issues are explained

Q19

 

4.3        Strategies for updating software for a Client/Server to minimise security risks are investigated

Q20

 

Configure and use virtualised images

5.1        System requirements for installing the virtualisation software are reviewed

2, 3, 4

 

5.2        Required services within the virtualised environment are installed

 

2.1, 2.2

5.3        System requirements to ensure virtual machines function are configured

 

2.2

5.4        Remote client access to virtual machines is configured

 

1.8, 2.7

Identify key concepts in networking personal computers

6.1        Key components of a computer network are identified

 

1, 10

6.2        Purpose and characteristics of networking standards are explained

 

1, 11

6.3        Changing the IP address in an operating system is performed

 

2.8

6.4        Network connectivity between computers is configured and tested

 

2.9

7 Connect devices to networks

           

           

           

           

           

           

           

7.1        Setting the IP address in an operating system is performed

 

2.7

7.2        Network connectivity between wired computers is configured and tested

 

2.8

7.3        Connectivity to an Internet Service Provider (ISP) from a wired Local Area Network (LAN) is demonstrated

 

2.1, 2.2

7.4        Base level troubleshooting methods for wired networks are demonstrated

 

3.2

7.5        Network connectivity using a Wireless LAN (WLAN) is demonstrated

 

2.9

7.6        Connectivity to an ISP from the WLAN is demonstrated

 

2.1, 2.2

7.7        Base level troubleshooting methods for WLAN networks are explained and demonstrated

 

3.2

7.8        Connectivity to an ISP from the WLAN is demonstrated

 

2.1, 2.2

 

8 Demonstrate base level Linux commands

           

           

           

           

8.1        Linux Operating system installation on a personal computer is performed

 

2.1

8.2        Structure and characteristics of the Linux operating system environment are defined

16

 

8.3        Linux security applications are identified

17

 

8.4        Basic system administration using Linux commands is performed

 

2.3

8.5        Linux commands to enable the personal computer to communicate with other devices in a network are defined and implemented

 

2.7, 2.9

Course Overview: Access Course Overview