Perform new course search

Search Filter

Security and Support in IT (7167.8)

Level: Undergraduate Second Year Level
Credit Points: 3
HECS Bands: 2
Faculty: Faculty of Science and Technology
Discipline: Academic Program Area - Technology

Availability

    Unit Outlines

    To view your Unit Outline, click View to log in to MyUC and access this information, or visit your unit's online teaching site.

    • Semester 2, 2018, ON-CAMPUS, GBCA-MELB (181927) - View
    • Semester 2, 2018, ON-CAMPUS, BRUCE (181929) - View
    • Semester 2, 2017, ON-CAMPUS, GBCA-MELB (174765) - View
    • Semester 2, 2017, ON-CAMPUS, BRUCE (166014) - View
    • Semester 2, 2016, FLEXIBLE, BRUCE (152229) - View
    • Semester 2, 2015, FLEXIBLE, UC-MELB (147347) - View
    • Semester 2, 2015, FLEXIBLE, SWSI-LVPL (147346) - View
    • Semester 2, 2015, FLEXIBLE, BRUCE (147344) - View
    • Semester 1, 2015, FLEXIBLE, BRUCE (147349) - View

    If a link to your Unit Outline is not displayed, please check back later. Unit Outlines are generally published by Week One of the relevant teaching period.

    Syllabus

    This unit teaches the principles and practice of IT system support and security management. Topics include desktop computer support, server computer support, help desk operation, cryptography and its application, software security, network security, operating system security, trusted computing and multilevel security, privacy issues, and professionalism and professional ethics. The unit provides students with a sound knowledge of IT infrastructure and security. It also provides students with the skills of daily operation, i.e., the support and management of these systems. In addition, the unit promotes and strengthens important generic skills, such as communication, analysis and inquiry, problem solving, independent and group working, and professionalism and social responsibility. This unit will be co-taught with Security and Support in IT G, 6689.

    Learning Outcomes

    On successful completion of this unit, students will be able to:

    1.Describe the basic concepts of various encryption algorithms and choose appropriate encryption algorithms for applications;

    2. Explain security threats, such as malicious software and DOS etc., and apply appropriate counter measures, such as firewall, multiple security models, and authentication and authorisation etc;

    3. Undertake the basic tasks in managing IT infrastructure in a hypothetical or real case scenario, including desktop and server and computers, network, help desk operation, and security; and

    4. Further strengthen important generic skills, such as communication, analysis and inquiry, problem solving, independent and group working, and professionalism and social responsibility.

    Assessment Items

    Contact Hours

    Up to 3 hours per week - 2 hours lecture and 1 hour laboratory.

    Prerequisites

    None.

    Corequisites

    None.

    Assumed Knowledge

    Assumed Knowledge: basic understanding of IT systems, including computer hardware, network, operating systems, storage media, database, and programming.

    Incompatible Units

    None.

    Equivalent Units

    None.



    Print this page
    ApplyEnquire
    Why choose UC

    Perform new course search

    Search Filter

    Frequently Asked Questions