SIT182 - Real World Practices for Cyber Security
Unit details
Year: | 2023 unit information |
---|---|
Enrolment modes: | Trimester 1: Burwood (Melbourne), Waurn Ponds (Geelong), Online Trimester 2: Burwood (Melbourne), Waurn Ponds (Geelong), Online |
Credit point(s): | 1 |
EFTSL value: | 0.125 |
Unit Chair: | Trimester 1: Chang-Tsun Li Trimester 2: Jack Li |
Prerequisite: | Nil |
Corequisite: | Nil |
Incompatible with: | SIT351, SITM182 |
Typical study commitment: | Students will on average spend 150 hours over the teaching period undertaking the teaching, learning and assessment activities for this unit. |
Scheduled learning activities - campus: | 2 x 1 hour online classes per week, 1 x 2 hour workshop per week. |
Scheduled learning activities - online: | Online independent and collaborative learning including 2 x 1 hour online classes per week (recordings provided), 1 x 2 hour online workshop per week. |
Note:Student Equipment Purchases Learning experiences and assessment activities in this unit may require that students have access to specific computing equipment such as external wireless adapters capable of injecting packets (to the approximate value of $100). This equipment will also be usable in subsequent units of the course. If purchases were required, students will be informed at the start of the unit. |
Content
In SIT182 students will learn the real world practices of cyber security by solving problems based on realistic case studies. Students will explore fundamental concepts of risks in managing communication networks and choose the appropriate means to manage these risks. The unit enables students to understand threats and vulnerabilities in the context of how systems can be compromised and how we can prevent harm to systems. There will be a practical focus on how we can detect and respond to cyber attacks. The key to learning will be introducing students to practices through case studies.
ULO | These are the Learning Outcomes (ULO) for this unit. At the completion of this unit, successful students can: | Deakin Graduate Learning Outcomes |
---|---|---|
ULO1 | Explain and implement approaches to computer security including monitoring, access control, identity verification and authentication in order to minimize the impact of cyber attacks on a system. | GLO1: Discipline-specific knowledge and capabilities |
ULO2 | Assess the impact of different attacks against organisations and analyse the effectiveness of its countermeasures. | GLO1: Discipline-specific knowledge and capabilities |
ULO3 | Describe modern approaches to cryptography and explain how these are applied to secure networks. | GLO1: Discipline-specific knowledge and capabilities |
ULO4 | Select and use cyber security tools to protect and attack computer systems in a professional manner. | GLO1: Discipline-specific knowledge and capabilities |
Assessment
Assessment Description | Student output | Grading and weighting (% total mark for unit) | Indicative due week |
---|---|---|---|
Learning Portfolio | Written portfolio | 100% | Week 12 |
The assessment due weeks provided may change. The Unit Chair will clarify the exact assessment requirements, including the due date, at the start of the teaching period.
Hurdle requirement
To be eligible to obtain a pass in this unit, students must meet certain milestones as part of the portfolio.
Learning Resource
There is no prescribed text.
The texts and reading list for the unit can be found on the University Library via the link below: SIT182 Note: Select the relevant trimester reading list. Please note that a future teaching period's reading list may not be available until a month prior to the start of that teaching period so you may wish to use the relevant trimester's prior year reading list as a guide only.
Unit Fee Information
Click on the fee link below which describes you: