IT Security
Duration
- One Semester or equivalent
Contact hours
- 36 hours Face to Face + Blended + Swinburne Online
On-campus unit delivery combines face-to-face and digital learning.
2023 teaching periods
Hawthorn Higher Ed. Semester 2 |
||
---|---|---|
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
2024 teaching periods
Swinburne Online Teaching Period 3 |
Swinburne Online Teaching Period 2 | |
---|---|---|
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
Prerequisites
Aims and objectives
Students who complete this unit of study will understand the nature of security threats to IT systems. Student will be familiar with the tools used by hackers and crackers and be aware of ways of identifying and rectifying security breaches and will understand how to assess the vulnerability of computing systems.
Unit information in detail
- Teaching methods, assessment and content.
Teaching methods
Type | Hours per week | Number of Weeks | Total |
Live Online Class | 1 | 12 | 12 |
On Campus Class (Computer Lab) | 2 | 12 | 24 |
Online Directed Online Learning and Independent Learning | 1 | 12 | 12 |
Unspecified Activities Independent Learning | 8.33 | 12 | 100 |
TOTAL | 148 hours |
Type | Hours per week | Number of Weeks | Total |
Online Directed Online Learning and Independent Learning | 12.5 | 12 | 150 |
TOTAL | 150 hours |
Assessment
Types | Individual/Group Role | Weighting | Unit Learning Outcomes (ULOs) |
Applied Project | Individual | 35-45% | 1,2,3,4,5 |
Research Project | Individual/Group | 35-45% | 1,2,4,6 |
Test | Individual | 15-25% | 1,2,4 |
Content
- Overview of Internet Crime and computer security threats
- Operating System Flaws
- Security Tools
- System logs
- Firewalls, security: theory, practice, design
- Ports scanning, packet sniffing and intrusion detection
- Understanding and responding to security alerts
- Server technologies, risks and policies
- Vulnerability analysis and Audit
- Secure programming practices
- Script injection and input sanitizing
- Security Models
- Physical Security
- Authentication (identity, biometrics and digital signatures)
Study resources
- Reading materials, recommended reading and references.