Credit points: 15

Subject outline

Every organization and business that intends to protect itself from threats of cyber-attacks needs to know current practices in cyber defence. This subject will introduce common technologies used to identify and mitigate threats including firewalls, intrusion detection systems, intrusion protection systems and honeypots. This subject also introduces incident response processes and simple ways to incorporate secure programming practices to make computer programs less vulnerable to attacks.

SchoolEngineering and Mathematical Sciences

Credit points15

Subject Co-ordinatorN/A

Available to Study Abroad/Exchange StudentsYes

Subject year levelYear Level 1 - UG

Available as ElectiveNo

Learning ActivitiesN/A

Capstone subjectNo

Subject particulars

Subject rules



Incompatible subjectsN/A

Equivalent subjectsN/A

Quota Management StrategyN/A

Quota-conditions or rulesN/A

Special conditionsN/A

Minimum credit point requirementN/A

Assumed knowledgeN/A


The Computer Incident Response Planning Handbook

Resource TypeBook

Resource RequirementPrescribed

AuthorN.K. McCarthy





Chapter/article titleN/A



Other descriptionN/A

Source locationN/A

Career Ready


Work-based learningNo

Self sourced or Uni sourcedN/A

Entire subject or partial subjectN/A

Total hours/days requiredN/A

Location of WBL activity (region)N/A

WBL addtional requirementsN/A

Graduate capabilities & intended learning outcomes

Graduate Capabilities

Intended Learning Outcomes

01. Investigate, evaluate and apply current cybersecurity technologies that protect against cyber threats
02. Describe the process of threat and vulnerability identification in cybersecurity environments
03. Formulate and coordinate basic cyber incident responses
04. Employ secure software design practices when working in teams.

Subject options

Select to view your study options…

Start date between: and    Key dates

Melbourne (Bundoora), 2020, Semester 2, Day


Online enrolmentYes

Maximum enrolment sizeN/A

Subject Instance Co-ordinatorAbdun Mahmood

Class requirements

Computer Laboratory Week: 32 - 43
One 2.00 h computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.

Lecture Week: 31 - 43
One 2.00 h lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.


Assessment elementCommentsCategoryContributionHurdle% ILO*
Written Report on current security technologies in practice (equivalent to 500 words)N/AN/AN/ANo10 SILO1
Report on threat and vulnerability identification (equivalent to 1000 words) This assignment has two parts: A written 500 word report and a 10 minute oral presentationN/AN/AN/ANo20 SILO2
Written Group submission on Software design practices (equivalent to 1000 words each)N/AN/AN/ANo30 SILO3
One 2-hour exam (equivalent to 2000 words)N/AN/AN/ANo40 SILO1, SILO2, SILO3, SILO4