- Study with us
- Federation University at MIT
- About us
MN623 Cyber Security and Analytics
|20.00||MN502 Overview of Network Security||N/A||60 contact hours|
Aims & Objectives
This is a core unit out of a total of 12 units in the Master of Networking (MNet). This unit addresses the MNet course learning outcomes and complements other courses in a related field by developing students’ specialised knowledge of cyber security solutions based on intelligent data analytic tools and technologies.
This unit is part of the AQF level 9 (MNet) course.
This unit evaluates and applies contemporary intelligent cyber security solutions for enterprise use. Students will be able to provide advanced security solutions to the business enterprises with in‐depth knowledge of cyber threats and its corresponding security protocols.
The students will exercise their skills and knowledge of data analytics in selecting and deploying advanced and intelligent cybersecurity systems for enterprise security.
This unit will cover the following topics:
- Advanced threats and attacks on enterprise systems (cracking, spoofing, hijacking, and resource attacks)
- Security technologies (Access control, Firewalls, VPNs, and Intrusion Detection System)
- Data classification and management for risk assessment
- Decision support system for security control
- Intelligent security management systems
At the completion of this unit students should be able to:
- Analyse cyber security vulnerabilities using ethical hacking methodologies
- Implement and evaluate security testing tools in a realistic computing environment
- Evaluate intelligent security solutions based on data analytics
- Analyse and interpret results from descriptive and predictive data analysis
- Propose cyber security solutions for business case studies
Lecture: 2 hours
Laboratory: 2 hours
Tutorial: 1 hours
Laboratory: 2 hours
Tutorial: 1 hours
Face to Face
|Assessment Task||Learning Outcomes Assessed*||Weighting|
|Mid term test||a||10%|
|Laboratory participation & submission||a-e||10%|
|Final Examination (2 hours)||a-e||50%|
*refer to learning outcomes above.
Note: Students are required to purchase the prescribed text book and have it available each week in class.
Prescribed Text Book:
C. Chio, D. Freeman, Machine Learning and Security: Protecting Systems with Data and Algorithms, O’Reilly Media Inc., 1st Ed., 2018.
- A. Basta, N. Basta, M. Brown, Computer Security and Penetration Testing, Cengage, 2nd Ed., 2014
- M. E. Whitman, H. J. Mattord, Principles of Information Security, Cengage, 6th Ed., 2018
- D. Shoemaker, K. Singler, Cybersecurity: Engineering a Secure Information Technology Organization, 1st ed., Cengage Learning, USA, 2015
- D. Shoemaker, K. Singler, Cybersecurity: The Essential Body of Knowledge, 1st ed., Cengage Learning, 2012
- D. Sutton, Cyber Security: A Practitioner’s Guide, BSC Learning and Development Ltd, UK, 2017
- S. Ali, T. A. Balushi, Z. Nadir, O. K. Hussain, Cyber Security for Cyber Physical Systems, Springers, Australia, 2018
- R. J. Robinson, Introduction to Blockchain Cyber Security, Kindle ed., 2016
- Dehghantanha, M. Conti, T. Dargahi, Cyber Threat Intelligence, Springers, 1st Ed., 2018
Adopted Reference Style: IEEE
MIT is committed to ensure the course is current, practical and relevant so that graduates are “work ready” and equipped for life-long learning. In order to accomplish this, the MIT Graduate Attributes identify the required knowledge, skills and attributes that prepare students for the industry.
The level to which Graduate Attributes covered in this unit are as follows:
|Ability to communicate||Independent and Lifelong Learning||Ethics||Analytical and Problem Solving||Cultural and Global Awareness||Team work||Specialist knowledge of a field of study|
|Colour coding||Extent covered|
|The standard is covered by theory and practice, and addressed by assessed activities in which the students always play an active role, e.g. workshops, lab submissions, assignments, demonstrations, tests, examinations|
|The standard is covered by theory or practice, and addressed by assessed activities in which the students mostly play an active role, e.g. discussions, reading, intepreting documents, tests, examinations|
|The standard is discussed in theory or practice; it is addressed by assessed activities in which the students may play an active role, e.g. lectures and discussions, reading, interpretation, workshops, presentations|
|The standard is presented as a side issue in theory or practice; it is not specifically assessed, but it is addressed by activities such as lectures or tutorials|
|The standard is not considered, there is no theory or practice or activities associated with this standard|