Credit points: 15
In this subject, students will learn how to create and execute frameworks for cyber security governance, based on an understanding of business strategy and risk appetite. Students will become familiar with standards and frameworks commonly used to ensure that business goals can be achieved in a secure way. Students will learn how to identify appropriate roles and responsibilities to support the security function.
SchoolEngineering and Mathematical Sciences
Subject Co-ordinatorAlex Ng
Available to Study Abroad/Exchange StudentsYes
Subject year levelYear Level 5 - Masters
Available as ElectiveNo
Prerequisites Must have passed CSE5CSP and must be admitted into SMCYC or SMCYL or SMCYB or must obtain subject coordinator's approval
Quota Management StrategyN/A
Quota-conditions or rulesN/A
Minimum credit point requirementN/A
Self sourced or Uni sourcedN/A
Entire subject or partial subjectN/A
Total hours/days requiredN/A
Location of WBL activity (region)N/A
WBL addtional requirementsN/A
Graduate capabilities & intended learning outcomes
Intended Learning Outcomes
Select to view your study options…
Melbourne (Bundoora), 2021, Semester 2, Day
Maximum enrolment sizeN/A
Subject Instance Co-ordinatorAlex Ng
Computer LaboratoryWeek: 30 - 42
One 2.00 hours computer laboratory per week on any day including weekend during the day from week 30 to week 42 and delivered via face-to-face.
LectureWeek: 30 - 42
One 2.00 hours lecture per week on any day including weekend during the day from week 30 to week 42 and delivered via face-to-face.
Cyber security business case development discussion forum (500-word equivalent)Students to use online forum to discuss cyber security business case development concepts. Marking rubric to specify the structure of the forum discussion.
Policy development and interpretation forum (500-word equivalent)Students to use online forum to Policy development and interpretation. Marking rubric to specify the structure of the forum discussion.
Use metrics and report on security KPIs - Case study and Report (2000-word equivalent)Development of a Cybersecurity management program with policies and procedures and discussion of its applicability.
|N/A||N/A||No||40||SILO1, SILO2, SILO3|
1 Exam x 2 hours (2000-word equivalent)With a focus on how to develop a cyber security governance framework
|N/A||N/A||No||40||SILO1, SILO2, SILO3, SILO4|