cse1cpr cybersecurity in practice

CYBERSECURITY IN PRACTICE

CSE1CPR

2018

Credit points: 15

Subject outline

Every organization and business that intends to protect itself from threats of cyber-attacks needs to know current practices in cyber defense. This subject will introduce common technologies used to identify and mitigate threats including firewalls, intrusion detection systems, intrusion protection systems and honeypots. This subject also introduces incident response processes and simple ways to incorporate secure programming practices to make computer programs less vulnerable to attacks.

SchoolSchool Engineering&Mathematical Sciences

Credit points15

Subject Co-ordinatorAbdun Mahmood

Available to Study Abroad StudentsYes

Subject year levelYear Level 1 - UG

Exchange StudentsNo

Subject particulars

Subject rules

Prerequisites CSE1ICB

Co-requisitesN/A

Incompatible subjectsN/A

Equivalent subjectsN/A

Special conditionsN/A

Learning resources

Readings

Resource TypeTitleResource RequirementAuthor and YearPublisher
ReadingsThe Computer Incident Response Planning HandbookPrescribedN.K. McCarthy, 2013McGraw-Hill

Graduate capabilities & intended learning outcomes

01. Investigate, evaluate and apply current cybersecurity technologies that protect against cyber threats

Activities:
5 x 2 hour Lectures on existing intrusion detection techniques, how firewalls protect attacks on computer systems, and network security. These concepts will be practiced and tested in a laboratory environment using various testing tools.

02. Describe the process of threat and vulnerability identification in cybersecurity environments

Activities:
3 x 2 hour lectures on threat detection, vulnerability analysis, cyber incident analysis and response. Students will design and develop incident reports and response report during laboratory practice.

03. Formulate and coordinate basic cyber incident responses

Activities:
2 x 2 hour lectures on the steps involved in incident response. Students will analyze case studies and standards to describe the response process to cyber-attack incidents

04. Employ secure software design practices when working in teams.

Activities:
2 x 2 hour lectures on secure software design principles, and architecture, and testing of software.

Subject options

Select to view your study options…

Start date between: and    Key dates

Melbourne, 2018, Semester 2, Day

Overview

Online enrolmentYes

Maximum enrolment sizeN/A

Enrolment information

Subject Instance Co-ordinatorAbdun Mahmood

Class requirements

LectureWeek: 31 - 43
One 2.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Computer LaboratoryWeek: 32 - 43
One 2.0 hours computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.

Assessments

Assessment elementComments%ILO*
Written Report on current security technologies in practice (equivalent to 500 words)1001
Report on threat and vulnerability identification (equivalent to 1000 words)This assignment has two parts: A written 500 word report and a 10 minute oral presentation2002
Written Group submission on Software design practices (equivalent to 1000 words each)3003
One 2-hour exam (equivalent to 2000 words)4001, 02, 03, 04