CYBERSECURITY IN PRACTICE
Credit points: 15
Every organization and business that intends to protect itself from threats of cyber-attacks needs to know current practices in cyber defense. This subject will introduce common technologies used to identify and mitigate threats including firewalls, intrusion detection systems, intrusion protection systems and honeypots. This subject also introduces incident response processes and simple ways to incorporate secure programming practices to make computer programs less vulnerable to attacks.
SchoolSchool Engineering&Mathematical Sciences
Subject Co-ordinatorAbdun Mahmood
Available to Study Abroad StudentsYes
Subject year levelYear Level 1 - UG
|Resource Type||Title||Resource Requirement||Author and Year||Publisher|
|Readings||The Computer Incident Response Planning Handbook||Prescribed||N.K. McCarthy, 2013||McGraw-Hill|
Graduate capabilities & intended learning outcomes
01. Investigate, evaluate and apply current cybersecurity technologies that protect against cyber threats
- 5 x 2 hour Lectures on existing intrusion detection techniques, how firewalls protect attacks on computer systems, and network security. These concepts will be practiced and tested in a laboratory environment using various testing tools.
02. Describe the process of threat and vulnerability identification in cybersecurity environments
- 3 x 2 hour lectures on threat detection, vulnerability analysis, cyber incident analysis and response. Students will design and develop incident reports and response report during laboratory practice.
03. Formulate and coordinate basic cyber incident responses
- 2 x 2 hour lectures on the steps involved in incident response. Students will analyze case studies and standards to describe the response process to cyber-attack incidents
04. Employ secure software design practices when working in teams.
- 2 x 2 hour lectures on secure software design principles, and architecture, and testing of software.
Select to view your study options…
Melbourne, 2019, Semester 2, Day
Maximum enrolment sizeN/A
Subject Instance Co-ordinatorAbdun Mahmood
One 2.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.
One 2.0 hours computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.
|Written Report on current security technologies in practice (equivalent to 500 words)||10||01|
|Report on threat and vulnerability identification (equivalent to 1000 words)||This assignment has two parts: A written 500 word report and a 10 minute oral presentation||20||02|
|Written Group submission on Software design practices (equivalent to 1000 words each)||30||03|
|One 2-hour exam (equivalent to 2000 words)||40||01, 02, 03, 04|