Applied Cybersecurity
Duration
- One Semester or equivalent
Contact hours
- 36
2021 teaching periods
Swinburne Online
Teaching Period 1 | Teaching Period 3 | |
---|---|---|
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
Prerequisites
100cps – Master of Cybersecurity ManagementAims and objectives
This unit engages students in simulated threats in a cyber war environment providing an opportunity to be the attacker and the defender, understand the motivations on both sides, and apply an ethical and legal lens to both sides of the threat. Students will reflect, stratagise and apply lessons to develop a framework for cyber threat prevention.
Students who successfully complete this unit will be able to:
1. Describe the threats to network security and their defences from the attacker and the defender view
2. Critically analyse a cybersecurity threat scenario and develop management strategies for the protection of an organisation
3. Evaluate the theory and practice behind the cyber threat and the role that security management plays in the wider picture of cybersecurity
4. Analyse the procedures and practices involved in managing cyber security risks and threats and apply these to a real world situation
2. Critically analyse a cybersecurity threat scenario and develop management strategies for the protection of an organisation
3. Evaluate the theory and practice behind the cyber threat and the role that security management plays in the wider picture of cybersecurity
4. Analyse the procedures and practices involved in managing cyber security risks and threats and apply these to a real world situation
Unit information in detail
- Teaching methods, assessment, general skills outcomes and content.
Teaching methods
Face to Face Mode: Class 3 hours per week
Online Mode (SOL):
Engaging with online content and discussions
Student workload:
For all teaching and learning structures (both face to face and online), students are expected to spend an average of 150 hours per unit in total over the duration of the study period
This includes all:
• Scheduled teaching and learning events and activities (contact hours timetabled in a face-to-face teaching space) and scheduled online learning events (contact hours scheduled in an online teaching space), and
To be successful, students should:
• Read all prescribed materials and/or view videos in preparation for each class
• Attend and engage in all scheduled classes (face to face or online)
• Start assessment tasks well ahead of the due date, and submit assessments promptly
• Read / listen to all feedback carefully, and consider it for future assessment
• Engage with fellow students and teaching staff (don’t hesitate to ask questions)
Online Mode (SOL):
Engaging with online content and discussions
Student workload:
For all teaching and learning structures (both face to face and online), students are expected to spend an average of 150 hours per unit in total over the duration of the study period
This includes all:
• Scheduled teaching and learning events and activities (contact hours timetabled in a face-to-face teaching space) and scheduled online learning events (contact hours scheduled in an online teaching space), and
• Non-scheduled learning events and activities (including directed online learning activities, assessments, independent study, student group meetings, and research)
• Read all prescribed materials and/or view videos in preparation for each class
• Attend and engage in all scheduled classes (face to face or online)
• Start assessment tasks well ahead of the due date, and submit assessments promptly
• Read / listen to all feedback carefully, and consider it for future assessment
• Engage with fellow students and teaching staff (don’t hesitate to ask questions)
Assessment
Assignment (Individual) 50-60%
Project (Individual) 40-50%
General skills outcomes
• problem solving skills
• analysis skills
• communication skills
• ability to tackle unfamiliar problems
• ability to work independently
• analysis skills
• communication skills
• ability to tackle unfamiliar problems
• ability to work independently
Content
• Cyber war games unit
• Ethical hacking
• Software tools to monitor and capture network traffic
• Packet sniffing, spoofing, carrying out cyber attacks
• Attack and defence – human versus the machine
• Disaster recovery – business contingency and disaster recovery plan
• Incident response
• Intrusion detection and prevention
• Ethical hacking
• Software tools to monitor and capture network traffic
• Packet sniffing, spoofing, carrying out cyber attacks
• Attack and defence – human versus the machine
• Disaster recovery – business contingency and disaster recovery plan
• Incident response
• Intrusion detection and prevention
• Offensive versus defensive, how the two operate in harmony
Study resources
- References.
References
• Knapp, E & Samani, R 2013, Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, Syngress Media,U.S
• Linche, s 2015, Security Planning: An Applied Approach, Springer, Switzerland
• Salmon, A, Levesque, W & McLafferty, M 2017, Applied Network Security, Packt
• Saunders, M, Lewis, P & Thornhill, A 2012, Research Methods for Business Students, 6th Edition, Pearson Education Ltd.
• Zikmund, Babin, Carr & Griffith 2013, Business Research Methods by, 9th Edition, Cengage Learning.
• Cooper, DR & Schindler, PS 2014, Business research methods, 12th edn, McGraw-Hill Irwin, New York.
• Linche, s 2015, Security Planning: An Applied Approach, Springer, Switzerland
• Salmon, A, Levesque, W & McLafferty, M 2017, Applied Network Security, Packt
• Saunders, M, Lewis, P & Thornhill, A 2012, Research Methods for Business Students, 6th Edition, Pearson Education Ltd.
• Zikmund, Babin, Carr & Griffith 2013, Business Research Methods by, 9th Edition, Cengage Learning.
• Cooper, DR & Schindler, PS 2014, Business research methods, 12th edn, McGraw-Hill Irwin, New York.