System Security Project

CYB80001 25 Credit Points Available to incoming Study Abroad and Exchange students

Duration

  • 1 Semester
     
    This unit will be delivered on-line in Semester 2 2020

Contact hours

  • Equivalent to 96 hours

2020 teaching periods

Hawthorn

Higher Ed. Semester 2

Dates:
3 Aug 20 - 1 Nov 20

Results:
8 Dec 20

Last self enrolment:
16 Aug 20

Census:
31 Aug 20


Aims and objectives

Aims
 
The key focus of system security unit is on enabling students to develop practical and working tactics to achieve digital security. In this unit, students will learn operational system security, the security of databases and servers and various aspects including design, implementation, and configuration in order to apply security measures and principles to protect these systems. Students will explore the framework of cyber security and safety principles and guidelines and the various tools used to enforce security and privacy. The unit will use a project-based learning paradigm to facilitate team-based investigations into cybersecurity events and threats. Students will perform guided exploitation attacks in practical sessions.

Objectives (Unit Learning Outcomes) (ULO)

Students who successfully complete this Unit will be able to:

1. Demonstrate a knowledge of the terminology, classifications, technologies and consequences of cybersecurity threats and attacks.
2. Recommend and plan a range of the security controls and mitigation strategies to protect on-line and stand-alone computer systems, their weaknesses, functionalities, architectures, and configuration.
3. Assess and apply commonly-used techniques and tools to subvert computer security systems, enabling unauthorised access to data, processes, workflows and computing capacity.
4. Evaluate current security practices and security system usability in terms of the facilitation of social engineering attacks.
5. Discuss appropriate research methods for testing and evaluating investigation procedures and responses to attacks, data breaches and security threats.
6. Discuss the findings of cybersecurity investigations with peers and communicate to appropriate audiences.
7. Verify the effectiveness of team-based environments to investigate security threats and challenges.