Cyber Security as Infrastructure and Tools G (11711.1)
Available teaching periods | Delivery mode | Location |
---|---|---|
View teaching periods | Online |
UC - Canberra, Online |
EFTSL | Credit points | Faculty |
0.125 | 3 | Faculty Of Science And Technology |
Discipline | Study level | HECS Bands |
Academic Program Area - Technology | Graduate Level | Band 2 2021 (Commenced After 1 Jan 2021) Band 3 2021 (Commenced Before 1 Jan 2021) |
Learning outcomes
On successful completion of this unit, students will be able to:1. Explain cyber threats, IT infrastructure vulnerabilities and risks, and the effectiveness and efficiencies of cyber defence measures;
2. Investigate and appraise cyber security measures through relevant tools/techniques; and
3. Evaluate cyber security threats and risks to formulate solutions and recommendations for cyber resilient workplaces and communities.
Graduate attributes
1. UC graduates are professional - communicate effectively1. UC graduates are professional - display initiative and drive, and use their organisation skills to plan and manage their workload
1. UC graduates are professional - employ up-to-date and relevant knowledge and skills
1. UC graduates are professional - take pride in their professional and personal integrity
1. UC graduates are professional - use creativity, critical thinking, analysis and research skills to solve theoretical and real-world problems
2. UC graduates are global citizens - adopt an informed and balanced approach across professional and international boundaries
2. UC graduates are global citizens - behave ethically and sustainably in their professional and personal lives
2. UC graduates are global citizens - make creative use of technology in their learning and professional lives
2. UC graduates are global citizens - think globally about issues in their profession
3. UC graduates are lifelong learners - be self-aware
3. UC graduates are lifelong learners - evaluate and adopt new technology
3. UC graduates are lifelong learners - reflect on their own practice, updating and adapting their knowledge and skills for continual professional and academic development
Prerequisites
11709 Cyber Security as an Ecosystem GCorequisites
None.Incompatible units
None.Equivalent units
None.Assumed knowledge
None.Year | Location | Teaching period | Teaching start date | Delivery mode | Unit convener |
---|---|---|---|---|---|
2024 | UC - Canberra, Online | Study Block 2 | 11 March 2024 | Online | Dr Wanli Ma |
Required texts
Stallings W (2018) Operating systems: internals and design principles, 9th edn, Pearson, Boston. [the relevant pages only, ~30 pages; available online from UC Library]
Stallings W and Brown L (2018) Computer security : principles and practice, 4th edn, Pearson, New York, NY. [Chapter 3, 4, 6, and 9 only; Chapter 27 optional; available online from UC Library]
Pfleeger CP and Pfleeger SL (2007) Security in computing, 4th edn, Prentice Hall, Upper Saddle River, NJ. [Chapter 2 only; e-delivery;]
Whitman ME and Mattord HJ (2019) Management of information security, 6th edn, Cengage Learning, Stamford, CT. [available online from UC Library]
various online resources to be provided in details on the Canvas site
Submission of assessment items
Special assessment requirements
An aggregate mark of 50% is required to pass the unit.
Academic integrity
Students have a responsibility to uphold University standards on ethical scholarship. Good scholarship involves building on the work of others and use of others' work must be acknowledged with proper attribution made. Cheating, plagiarism, and falsification of data are dishonest practices that contravene academic values. Refer to the University's Student Charter for more information.
To enhance understanding of academic integrity, all students are expected to complete the Academic Integrity Module (AIM) at least once during their course of study. You can access this module within UCLearn (Canvas) through the 'Academic Integrity and Avoiding Plagiarism' link in the Study Help site.
Use of Text-Matching Software
The University of Canberra uses text-matching software to help students and staff reduce plagiarism and improve understanding of academic integrity. The software matches submitted text in student assignments against material from various sources: the internet, published books and journals, and previously submitted student texts.
Learner engagement
activities |
hours |
weekly lecture: 2 hours/week, X7 |
14 |
weekly tutorial: 2 hours/week, X6 |
12 |
self-study, 6 hours/week, X7 |
42 |
Assignment 1: 15 hours, including study time |
15 |
Assignment 2: 25 hours, including study time |
25 |
Assignment 3: 40 hours, including study time |
40 |
personal reflecting |
2 |
total |
150 |
Participation requirements
Your participation in both class and online activities will enhance your understanding of the unit content and therefore the quality of your assessment responses. Lack of participation may result in your inability to satisfactorily pass the assessment of the Unit.
Required IT skills
This unit is delivered online via the Virtual Room in your UCLearn teaching site.
Work placement, internships or practicums
None
- Study Block 2, 2024, Online, UC - Canberra, Online (220040)
- Study Block 6, 2023, Online, UC - Canberra, Online (215033)
- Study Block 4, 2023, Online, UC - Canberra, Online (215017)
- Study Block 2, 2023, Online, UC - Canberra, Online (215010)
- Study Block 6, 2022, Online, UC - Canberra, Online (210764)
- Study Block 2, 2022, Online, UC - Canberra, Online (209271)
- Study Block 6, 2021, Online, UC - Canberra, Online (209270)