Security and Support in IT (7167.8)
|Level:||Level 2 - Undergraduate Intermediate Unit|
Band 2 2013-2020 (Expires 31 Dec 2020) Band 2 2021 (Commenced After 1 Jan 2021) Band 3 2021 (Commenced Before 1 Jan 2021)
|Faculty:||Faculty of Science and Technology|
|Discipline:||Academic Program Area - Technology|
CLOSED FOR FUTURE ENROLMENT.
To view your Unit Outline, click View to log in to MyUC and access this information, or visit your unit's online teaching site.
- Semester 2, 2018, ON-CAMPUS, GBCA-MELB (181927) - View
- Semester 2, 2018, ON-CAMPUS, BRUCE (181929) - View
- Semester 2, 2017, ON-CAMPUS, GBCA-MELB (174765) - View
- Semester 2, 2017, ON-CAMPUS, BRUCE (166014) - View
- Semester 2, 2016, FLEXIBLE, BRUCE (152229) - View
- Semester 2, 2015, FLEXIBLE, UC-MELB (147347) - View
- Semester 2, 2015, FLEXIBLE, SWSI-LVPL (147346) - View
- Semester 2, 2015, FLEXIBLE, BRUCE (147344) - View
- Semester 1, 2015, FLEXIBLE, BRUCE (147349) - View
If a link to your Unit Outline is not displayed, please check back later. Unit Outlines are generally published by Week One of the relevant teaching period.
This unit teaches the principles and practice of IT system support and security management. Topics include desktop computer support, server computer support, help desk operation, cryptography and its application, software security, network security, operating system security, trusted computing and multilevel security, privacy issues, and professionalism and professional ethics. The unit provides students with a sound knowledge of IT infrastructure and security. It also provides students with the skills of daily operation, i.e., the support and management of these systems. In addition, the unit promotes and strengthens important generic skills, such as communication, analysis and inquiry, problem solving, independent and group working, and professionalism and social responsibility. This unit will be co-taught with Security and Support in IT G, 6689.
On successful completion of this unit, students will be able to:
1.Describe the basic concepts of various encryption algorithms and choose appropriate encryption algorithms for applications;
2. Explain security threats, such as malicious software and DOS etc., and apply appropriate counter measures, such as firewall, multiple security models, and authentication and authorisation etc;
3. Undertake the basic tasks in managing IT infrastructure in a hypothetical or real case scenario, including desktop and server and computers, network, help desk operation, and security; and
4. Further strengthen important generic skills, such as communication, analysis and inquiry, problem solving, independent and group working, and professionalism and social responsibility.
- UC - Canberra, Bruce
- UC - Global Business College of Australia, Melbourne
Up to 3 hours per week - 2 hours lecture and 1 hour laboratory.
Assumed Knowledge: basic understanding of IT systems, including computer hardware, network, operating systems, storage media, database, and programming.
- 799AA Bachelor of Arts/Bachelor of Information Technology
- 106JA Bachelor of Engineering in Network and Software Engineering
- 344JA Bachelor of Engineering in Network and Software Engineering (Honours)
- 322HG Bachelor of Information Technology
- 998AA Bachelor of Information Technology / Bachelor of Media Arts and Production
- 329JA Bachelor of Secondary Education/Bachelor of Mathematics and Computing Technology Studies
- 157JA Bachelor of Sport Coaching and Exercise Science/Bachelor of Information Technology
- MJ0164 Major in Applied Software Engineering (BSE/BBI) (Restricted)
- MJ0244 Major in Computing Technology Teaching (Software Design and Development) (Restricted)
- MJ0057 Major in Information Systems (BIT) (Restricted)
- MJ0237 Major in Information Technology
- MJ0276 Major in Information Technology
- MN0057 Minor in IT: Support