This subject is available under ICMS undergraduate degrees, please click the button below to find an undergraduate course for you.
CYB201A
Specialisation
3 credit points
CYB101A Cyber Security Essentials
ICT102A Network Fundamentals
Course level of study pre-requisite: a total of 12 credit points including ICT101A, ICT102A, ICT103A and DAT101A from level 100 core subjects prior to enrolling into level 200 core and specialisation subjects.
200
A well-modelled and securely architected computer networks ecosystem minimises the risk of falling victim to potential data breaches and damage to organisational infrastructure. Given the global interconnectivity and widespread utilisation of network services, establishing a secure network environment is essential to maximise organisational cyber resiliency.
This subject provides students with the foundational knowledge and skills required to secure a network system, focusing on security principles from a technical perspective. Students will use contemporary security methods and technologies to monitor computer networks, detect vulnerabilities, analyse alerts, and promote ways to ensure confidentiality and availability in data communications.
Students will explore security controls that are contextually used in an archetypal network environment to defend its ecosystem against cyberattacks. They will conduct vulnerability assessments using industry tools and techniques and enact suitable defence mechanisms to safeguard common network services in a layered architecture. Secure communication techniques, threat management practices, and authentication protocols will also be examined.
a) Explain network security principles and concepts, including associated services, protocols, challenges, and applications.
b) Use network security tools and techniques to conduct vulnerability assessments and discover security issues to improve system security design.
c) Analyse security issues associated with data networks and identify solutions for resolution.
d) Detect vulnerabilities in a network environment and apply suitable countermeasures to secure services and mitigate potential threats.
e) Explain a range of network technologies including their role and usage in designing, implementing, and maintaining a secure network system.
No | Assessment Task | Weighting | Learning Outcomes |
1 | Online Quizzes (Invigilated) | 15% | a, e |
15% | |||
2 | Case Study | 30% | a, c, e |
3 | Network Security Project | 40% | b, c, d, e |
Broad Topics to be Covered:
Topic: |
Week 1: Fundamentals of Network Security
|
Week 2: Cryptography and Encryption
|
Week 3: Identity Management and Authentication
|
Week 4: Transport Layer and Web Security
|
Week 5: Physical Layer Security
|
Week 6 – 7: Wireless Security
|
Week 8 – 9: IP and Protocol Security
|
Week 10: Malicious Software and Threat Management
|
Week 11: Network Intrusion Detection
|