- One Semester or equivalent
- 36 hours face to face + blended
On-campus unit delivery combines face-to-face and digital learning.
AND One of
Aims and objectives
Students who complete this unit of study will understand the nature of security threats to IT systems. Students will also be aware of deficiencies in modern software systems and will understand how to manage the security of computer networks. Students will be familiar with the tools used by hackers and crackers and be aware of ways of identifying and rectifying security breaches and they will be able to collect digital evidence and understand the rules of evidence gathering.
Unit Learning Outcomes (ULO)
Students who successfully complete this Unit will be able to:
1. Evaluate security of networks and servers.
2. Determine suitable management plans for system security.
3. Develop audit plans which rate security of hosts, networks and systems.
4. Verify potential vulnerabilities through an understanding of social engineering.
5. Prioritise penetration testing activities by using a variety of security-related tools.
6. Verify potential vulnerabilities through an understand concepts of network monitoring.
7. Analyse and interpret logs and make recommendations on current Internet Security based on independent research.
Unit information in detail
- Teaching methods, assessment and content.
Hours per week
Number of Weeks
On Campus Lecture
|On Campus Class in Computer Lab||1||12||12|
Unspecified Activities Independent Learning
Individual or Group task
Assesses attainment of these ULOs
Individual or Group
As the minimum requirements of assessment to pass a unit and meet all Unit Learning Outcomes to a minimum standard, a student must achieve:
(i) an aggregate mark of 50% or more, and
(ii) obtain at least 40% in the final exam
Students who do not successfully achieve hurdle requirement (ii) will receive a maximum of 44% as the total mark for the unit and will not be eligible for a conceded pass.
• Operating System Flaws
• Introduction to maintaining a Secure System
• Set up, patch and monitor
• System logs
• Firewalls, security: theory, practice, design and implementation
• Ports scanning, packet sniffing and intrusion detection
• Understanding and responding to security alerts
• Server technologies, risks and policies
• Vulnerability analysis and Audit
• Secure programming practices
• Security Models
• Physical Security
• Authentication (identity, biometrics and digital signatures).
- Reading materials.
A list of reading materials and/or required texts will be made available in the Unit Outline.