Advanced Cyber Security (11907.1)
|Available teaching periods||Delivery mode||Location|
|View teaching periods|| On-Campus
|| Bruce, Canberra
|0.125||3||Faculty Of Science And Technology|
|Discipline||Study level||HECS Bands|
|Academic Program Area - Technology||Level 3 - Undergraduate Advanced Unit|| Band 2 2021 (Commenced After 1 Jan 2021)
Band 3 2021 (Commenced Before 1 Jan 2021)
Learning outcomesOn successful completion of the unit, students will be able to:
1. Describe basic cryptographic functionality, including symmetric ciphers, public key encryption, and digital signatures;
2. Evaluate the security of systems that use cryptography and secure communication techniques;
3. Identify the vulnerability of information systems and justify specific security technologies, settings, and parameters that can improve system security design;
4. Describe existing secure network architectures by applying security technologies such as firewalls, intrusion detection systems, and malicious software scanners; and
5. Discuss how privacy and social engineering issues can impact system design.
Graduate attributes1. UC graduates are professional - communicate effectively
1. UC graduates are professional - display initiative and drive, and use their organisation skills to plan and manage their workload
1. UC graduates are professional - employ up-to-date and relevant knowledge and skills
1. UC graduates are professional - take pride in their professional and personal integrity
1. UC graduates are professional - use creativity, critical thinking, analysis and research skills to solve theoretical and real-world problems
1. UC graduates are professional - work collaboratively as part of a team, negotiate, and resolve conflict
2. UC graduates are global citizens - adopt an informed and balanced approach across professional and international boundaries
2. UC graduates are global citizens - behave ethically and sustainably in their professional and personal lives
2. UC graduates are global citizens - communicate effectively in diverse cultural and social settings
Prerequisites11906 Introduction to Cyber Security AND 4483 Software Technology 1
Incompatible units6697 Computer and Network Security PG
Equivalent units8019 Computer and Network Security
Assumed knowledgeIT skills commensurate with advanced study of information technology are assumed.
|Year||Location||Teaching period||Teaching start date||Delivery mode||Unit convener|
|2023||Bruce, Canberra||Semester 2||31 July 2023||On-Campus||Dr Mohammad Abualsheikh|
|2024||Bruce, Canberra||Semester 2||29 July 2024||On-Campus||Dr Mohammad Abualsheikh|
Cryptography and Network Security: Principles and Practice, 8th Edition, Global Edition, by William Stallings
Submission of assessment items
Extensions & Late submissions
Students must clearly state their individual contributions to group assignments. The marks will be given as per their efforts and contributions to the assignment.
Special assessment requirements
- An aggregate mark of 50% is required to pass the unit.
- The unit convenor reserves the right to question students on any of their submitted work for moderation and academic integrity purposes, which may result in an adjustment to the marks awarded for a specific task.
Students have a responsibility to uphold University standards on ethical scholarship. Good scholarship involves building on the work of others and use of others' work must be acknowledged with proper attribution made. Cheating, plagiarism, and falsification of data are dishonest practices that contravene academic values. Refer to the University's Student Charter for more information.
To enhance understanding of academic integrity, all students are expected to complete the Academic Integrity Module (AIM) at least once during their course of study. You can access this module within UCLearn (Canvas) through the 'Academic Integrity and Avoiding Plagiarism' link in the Study Help site.
Use of Text-Matching Software
The University of Canberra uses text-matching software to help students and staff reduce plagiarism and improve understanding of academic integrity. The software matches submitted text in student assignments against material from various sources: the internet, published books and journals, and previously submitted student texts.
12 lectures x 2 hours each
11 tutorials x 2 hours each
Weekly study commitment: 12 weeks x 3 hours
Assignment and project
Your participation in both class and online activities will enhance your understanding of the unit content and the quality of your assessment work. Lack of participation may result in your inability to satisfactorily pass assessment items.
Required IT skills
Appropriate understanding of mathematics, computer programming, and networking.
Work placement, internships or practicums