Availabilities:

Location Domestic International
Coomera
Term4
Term4
Gold Coast
Term4
Term4
Online
Term1,4
N/A

Unit Summary

Unit type

UG Coursework Unit

Credit points

12

Unit aim

Gives students knowledge and skills to secure and operate networked information systems including their software, applications and services. Students will learn about operating systems, their security mechanisms and the prevalent security threats to hosts and applications as well as how to defend a networked information system against these security threats.

Unit content

1. The Security Operations Centre (SOC)

2. System security by design

3. Security information and event management (SIEM)

4. Security intelligence and system penetration testing

5. Digital forensics and incident response (DFIR) for safety critical systems

6. Critical infrastructure and security

Learning outcomes

Unit Learning Outcomes express learning achievement in terms of what a student should know, understand and be able to do on completion of a unit. These outcomes are aligned with the graduate attributes. The unit learning outcomes and graduate attributes are also the basis of evaluating prior learning.

On completion of this unit, students should be able to:
1 explain and evaluate secure development operations, operating systems architectures and their security mechanisms
2 identify and analyse prevalent threats to enterprise security
3 install, configure and use appropriate tools to test and secure critical system services
4 develop and validate response programs as a team to restore system operations following compromise of a system and forensically investigate the incident

On completion of this unit, students should be able to:

  1. explain and evaluate secure development operations, operating systems architectures and their security mechanisms
  2. identify and analyse prevalent threats to enterprise security
  3. install, configure and use appropriate tools to test and secure critical system services
  4. develop and validate response programs as a team to restore system operations following compromise of a system and forensically investigate the incident

Prescribed texts

  • No prescribed texts.

  • No prescribed texts.
Prescribed texts may change in future teaching periods.