CYBERSECURITY IN PRACTICE

CSE1CPR

2020

Credit points: 15

Subject outline

Every organization and business that intends to protect itself from threats of cyber-attacks needs to know current practices in cyber defence. This subject will introduce common technologies used to identify and mitigate threats including firewalls, intrusion detection systems, intrusion protection systems and honeypots. This subject also introduces incident response processes and simple ways to incorporate secure programming practices to make computer programs less vulnerable to attacks.

School: Engineering and Mathematical Sciences (Pre 2022)

Credit points: 15

Subject Co-ordinator: Abdun Mahmood

Available to Study Abroad/Exchange Students: Yes

Subject year level: Year Level 1 - UG

Available as Elective: No

Learning Activities: N/A

Capstone subject: No

Subject particulars

Subject rules

Prerequisites: CSE1ICB

Co-requisites: N/A

Incompatible subjects: N/A

Equivalent subjects: N/A

Quota Management Strategy: N/A

Quota-conditions or rules: N/A

Special conditions: N/A

Minimum credit point requirement: N/A

Assumed knowledge: N/A

Learning resources

The Computer Incident Response Planning Handbook

Resource Type: Book

Resource Requirement: Prescribed

Author: N.K. McCarthy

Year: 2013

Edition/Volume: N/A

Publisher: McGraw-Hill

ISBN: N/A

Chapter/article title: N/A

Chapter/issue: N/A

URL: N/A

Other description: N/A

Source location: N/A

Career Ready

Career-focused: No

Work-based learning: No

Self sourced or Uni sourced: N/A

Entire subject or partial subject: N/A

Total hours/days required: N/A

Location of WBL activity (region): N/A

WBL addtional requirements: N/A

Graduate capabilities & intended learning outcomes

Graduate Capabilities

Intended Learning Outcomes

01. Investigate, evaluate and apply current cybersecurity technologies that protect against cyber threats
02. Describe the process of threat and vulnerability identification in cybersecurity environments
03. Formulate and coordinate basic cyber incident responses
04. Employ secure software design practices when working in teams.

Melbourne (Bundoora), 2020, Semester 2, Day

Overview

Online enrolment: Yes

Maximum enrolment size: N/A

Subject Instance Co-ordinator: Abdun Mahmood

Class requirements

Computer LaboratoryWeek: 32 - 43
One 2.00 hours computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.

LectureWeek: 31 - 43
One 2.00 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Assessments

Assessment elementCommentsCategoryContributionHurdle%ILO*

Written Report on current security technologies in practice (equivalent to 500 words)

N/AN/AN/ANo10SILO1

Report on threat and vulnerability identification (equivalent to 1000 words)This assignment has two parts: A written 500 word report and a 10 minute oral presentation

N/AN/AN/ANo20SILO2

Written Group submission on Software design practices (equivalent to 1000 words each)

N/AN/AN/ANo30SILO3

One 2-hour exam (equivalent to 2000 words)

N/AN/AN/ANo40SILO1, SILO2, SILO3, SILO4