Year

2024

Credit points

10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 2Multi-mode

Prerequisites

ITEC204 Introduction to Cyber Security OR ITEC326 Information Systems Security

Unit rationale, description and aim

With the increasing reliance on technology, it is becoming more and more essential to secure every aspect of online information and data. Therefore, network security is very critical for any organisation and is essential to protecting client data. This unit covers the advanced network security concepts that require to developing students’ knowledge and practical skills in digital communication and security.

This unit is an advanced unit that includes theoretical foundations, current state of cryptography, and the topics related to the fundamental concepts needed to understand the advanced and sophisticated security issues in a networked environment. The unit contents include networking concepts, classical cipher design and analysis, key management, digital signatures and hash algorithms, wireless security, web security, email security and data stewardship. The unit also focuses on applications of network security tools to prevent or detect security attacks. The aim of this unit is to provide students with a good understanding of network security issues and the importance of data stewardship, as well as the knowledge and skills they need to plan, design or implement in order to secure a networked environment. 

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Learning Outcome NumberLearning Outcome DescriptionRelevant Graduate Capabilities
LO1Demonstrate knowledge on security services, security attacks, a wide range of vulnerabilities, potential threats to networks and systemsGC1, GC7
LO2Apply knowledge and skills in selecting appropriate cryptographic tools to provide the required security services and ensure common good through data stewardshipGC1, GC2, GC6, GC8
LO3Utilise different network security tools and applications to analyse security strength of existing control measuresGC1, GC2, GC7, GC8
LO4Design and integrate numerous security mechanisms for an organisation to mitigate vulnerabilities and threatsGC1, GC2, GC7, GC8

Content

Topics will include:

  • Introduction to network security
  • Unix programming
  • Programming in Shell Script
  • Key management
  • Data stewardship
  • Advanced cryptography
  • Authentication and password
  • Access control
  • Firewall and IDS
  • Email security
  • Wireless network security
  • Security tools

Learning and teaching strategy and rationale

This unit is offered in different modes. These are: “Attendance” mode, “Multi” mode and “Online” mode. This unit is offered in three modes to cater for the learning needs and preferences of a range of participants and maximise effective participation for isolated and/or marginalised groups.

Attendance Mode

In a weekly attendance mode, students will require face-to-face attendance in specific physical location/s. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops, most students report that they spend an average of one hour preparing before the workshop and one or more hours after the workshop practicing and revising what was covered. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for you to prepare and revise.

Multi-Mode

In a multi-mode, students will require face-to-face attendance in blocks of time determined by the School. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for you to prepare and revise.

Online Mode

This unit uses an active learning approach to support students in the exploration of the essential knowledge associated with working with technology. Students can explore the essential knowledge underpinning technological advances and develop knowledge in a series of online interactive lessons and modules. Students are given the opportunity to attend facilitated synchronous online seminar classes with other students and participate in the construction and synthesis of knowledge, while developing their knowledge of working with technology. Students are required to participate in a series of online interactive workshops which include activities, knowledge checks, discussion and interactive sessions. This approach allows flexibility for students and facilitates learning and participation for students with a preference for virtual learning.

Students should anticipate undertaking 150 hours of study for this unit, including class attendance, readings, online forum participation and assessment preparation.

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment item consists of a number of weekly labs which will give students the opportunity to implement their theoretical knowledge to solve problems in a lab environment. The second assessment item is a design report, where students will write a report on a given case study. The purpose of this assessment is to assess the students’ ability to apply their theoretical knowledge and design an effective solution to countermeasure security threats through collaborative learning. The final assessment is an open book exam, where students will study several case studies, critically analyse them and answer a number of open-ended questions. The purpose of this assessment is to test students’ ability to apply professional skills and practices in solving numerous problems.

The assessments for this unit are designed to demonstrate the achievement of each learning outcome. To pass this unit, students are required to:

  • obtain an overall mark of at least 50%
  • attempt all three assessment items 

Overview of assessments

Brief Description of Kind and Purpose of Assessment TasksWeightingLearning Outcomes

Assessment Task 1: Lab Assessments

This assessment consists of a series of weekly lab exercises where students are required to apply different network security tools and techniques to solve practical problems. The feedback from this assessment will help students to understand critical concepts of network security and their applications.

Submission Type: Individual

Assessment Method: Lab Practical task

Artefact: Source Code/Lab report

20%

LO1, LO3

Assessment Task 2: Reflective report on a case study

For this assessment tasks, students need to actively participate in online discussion forum to understand complex concepts through collaboration and self-reflection. They also required to write a 2500-word report reflecting their critical analysis on a contemporary issue of network security and its impact on the common good.

The purpose of this assessment is to assess the students’ critical and analytical ability to delve into complex concepts of network security.

Submission Type: Group

Assessment Method: Scientific report

Artefact: Written report

30%

LO1, LO2

Assessment Task 3: Open Book Exam

This assessment task tests the students’ grasp of both theoretical and practical aspects of the unit. The students will study several case studies, critically analyse them and answer a number of open-ended questions. They also have to use network security tools to investigate the given scenarios and justify the outcomes.   

Submission Type: Individual

Assessment Method: Exam

Artefact: Answer Script

50%

LO1, LO2, LO3, LO4

Representative texts and references

Stallings W 2017, Cryptography & Network Security: Principles and Practices, 7th edn, Pearson US

Stallings W & Brown L, 2018, Computer Security: Principle and Practices, 4th Edn, Pearson US.

Pfleeger C & Pfleeger S & Margulies J 2015, Security in Computing, 5th edn, Prentice Hall, New Jersey.

Anderson, R 2020, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd edn, Wiley.

Whitman, M & Mattord, H 2016, Principles of Information Security, 5th edn, Cengage, Boston. 

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs