ENTRY REQUIREMENTS AND WEIGHTING



Prerequisites: MN502 Overview of Network Security
Corequisites: N/A
Credit Points: 20 Credit Points
Level: Year 2, Core
Workload: Timetabled hours/week: 5 (Lecture= 2 hours, Tute/lab= 2 hours, PBL=1 hour)
  Personal Study Hours/week: 7

BRIEF DESCRIPTION

This is a third trimester core unit out of a total of 12 units in the Master of Networking (MNet). This unit addresses the MNet course learning outcomes and complement other courses in a related field by developing students’ specialised knowledge in network advance security and applying critical skills in networking security such as hacking skills, computer hardening and vulnerabilities. For further course information refer to: http://www.mit.edu.au/study-with-us/programs/master-networking .

This unit provides students with understanding and appreciation of the discipline of IT Information Security Management. They will also learn how information security management interacts with other organisational groups, especially with general management and with information technology groups.

This unit will cover the following areas:

  1. Introduction to the management of information security
  2. Planning for information security
  3. Planning for contingencies
  4. Information Security Policy
  5. Developing the security program
  6. Security Management Practices
  7. Risk Management: identifying and assessing risk
  8. Risk Management: Assessing and controlling risk
  9. Protection Mechanisms

LEARNING OUTCOMES

At the completion of this unit students will be capable of:

  1. Analyse and discuss the significance of IT security management for organisations 
  2. Discuss the role of IT security management to support the security of businesses and corporations
  3. Develop and implement IT security management structure for small, medium and large size businesses and corporations
  4. Evaluate on the security of the existing organisation architecture, data, application, technology, etc
  5. Investigate and discuss for the appropriate design and secure solution for varieties of organisations
  6. Analyse and report on the current and future state of the management of IT security infrastructure and its technologies
  7. Design and discuss a roadmap process to transform the IT security management structure to support long-term organisations’ goals
  8. Implement a process to support the administration and the management of organisations’ security
  9. Conduct practical investigations into Network Systems including industry procedures of Information Gathering, Vulnerability Identification, Exploitation and privilege escalation.

GRADUATE ATTRIBUTES

Ability to communicate Independent and Lifelong Learning Ethics Analytical and Problem Solving  Cultural and Global Awareness Team work Specialist knowledge of a field of study
             

Legend

Colour coding Extent covered
                                The standard  is covered by theory and practice, and addressed by assessed activities in which the students always play an active role, e.g. workshops, lab submissions, assignments, demonstrations, tests, examinations
  The standard is covered by theory or practice, and addressed by assessed activities in which the students mostly play an active role, e.g. discussions, reading, intepreting documents, tests, examinations
  The standard is discussed in theory or practice; it is addressed by assessed activities in which the students may play an active role, e.g. lectures and discussions, reading, interpretation, workshops, presentations 
  The standard is presented as a side issue in theory or practice; it is not specifically assessed, but it is addressed by  activities such as lectures or tutorials
  The standard  is not considered, there is no theory or practice or activities associated with this standard