cse1cpr cybersecurity in practice
CYBERSECURITY IN PRACTICE
CSE1CPR
2019
Credit points: 15
Subject outline
Every organization and business that intends to protect itself from threats of cyber-attacks needs to know current practices in cyber defense. This subject will introduce common technologies used to identify and mitigate threats including firewalls, intrusion detection systems, intrusion protection systems and honeypots. This subject also introduces incident response processes and simple ways to incorporate secure programming practices to make computer programs less vulnerable to attacks.
SchoolSchool Engineering&Mathematical Sciences
Credit points15
Subject Co-ordinatorAbdun Mahmood
Available to Study Abroad StudentsYes
Subject year levelYear Level 1 - UG
Exchange StudentsNo
Subject particulars
Subject rules
Prerequisites CSE1ICB
Co-requisitesN/A
Incompatible subjectsN/A
Equivalent subjectsN/A
Special conditionsN/A
Learning resources
Readings
Resource Type | Title | Resource Requirement | Author and Year | Publisher |
---|---|---|---|---|
Readings | The Computer Incident Response Planning Handbook | Prescribed | N.K. McCarthy, 2013 | McGraw-Hill |
Graduate capabilities & intended learning outcomes
01. Investigate, evaluate and apply current cybersecurity technologies that protect against cyber threats
- Activities:
- 5 x 2 hour Lectures on existing intrusion detection techniques, how firewalls protect attacks on computer systems, and network security. These concepts will be practiced and tested in a laboratory environment using various testing tools.
02. Describe the process of threat and vulnerability identification in cybersecurity environments
- Activities:
- 3 x 2 hour lectures on threat detection, vulnerability analysis, cyber incident analysis and response. Students will design and develop incident reports and response report during laboratory practice.
03. Formulate and coordinate basic cyber incident responses
- Activities:
- 2 x 2 hour lectures on the steps involved in incident response. Students will analyze case studies and standards to describe the response process to cyber-attack incidents
04. Employ secure software design practices when working in teams.
- Activities:
- 2 x 2 hour lectures on secure software design principles, and architecture, and testing of software.
Subject options
Select to view your study options…
Melbourne, 2019, Semester 2, Day
Overview
Online enrolmentYes
Maximum enrolment sizeN/A
Enrolment information
Subject Instance Co-ordinatorAbdun Mahmood
Class requirements
LectureWeek: 31 - 43
One 2.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.
Computer LaboratoryWeek: 32 - 43
One 2.0 hours computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.
Assessments
Assessment element | Comments | % | ILO* |
---|---|---|---|
Written Report on current security technologies in practice (equivalent to 500 words) | 10 | 01 | |
Report on threat and vulnerability identification (equivalent to 1000 words) | This assignment has two parts: A written 500 word report and a 10 minute oral presentation | 20 | 02 |
Written Group submission on Software design practices (equivalent to 1000 words each) | 30 | 03 | |
One 2-hour exam (equivalent to 2000 words) | 40 | 01, 02, 03, 04 |