Availabilities:
Location | Domestic | International |
---|---|---|
Coomera | Term2 | Term2 |
Gold Coast | Term2 | Term2 |
Melbourne | ||
Online | Term2 | Term2 |
Papua New Guinea - IBSU Port Moresby | ||
Perth | ||
Sydney |
Unit description
Gives students an in-depth understanding of cybersecurity from a management perspective including strategy (people), operations (process) and tactical (technology) pillars. Students will learn the knowledge and skills to manage cyber risks, recommend appropriate controls and contribute to developments of cyber security policies, standards and guidelines in SME.
Unit content
Learning outcomes
Unit Learning Outcomes express learning achievement in terms of what a student should know, understand and be able to do on completion of a unit. These outcomes are aligned with the graduate attributes. The unit learning outcomes and graduate attributes are also the basis of evaluating prior learning.
On completion of this unit, students should be able to: | |
---|---|
1 | assess organisational cybersecurity posture to define, document and publish the directions the required cybersecurity program will adopt to address the risk |
2 | evaluate and develop cybersecurity programs to ensure information security |
3 | model and choose cybersecurity controls in response to advanced persistent threats to formulate recovery procedures and business continuity plans for cyber security incidents |
4 | work in a team to conduct research and evaluate recent trends in cybersecurity management |
On completion of this unit, students should be able to:
- assess organisational cybersecurity posture to define, document and publish the directions the required cybersecurity program will adopt to address the risk
- evaluate and develop cybersecurity programs to ensure information security
- model and choose cybersecurity controls in response to advanced persistent threats to formulate recovery procedures and business continuity plans for cyber security incidents
- work in a team to conduct research and evaluate recent trends in cybersecurity management
Prescribed Learning Resources
- No prescribed texts.
European Commission (EC); “The Directive...concerning measures for a high common level of security of network and information systems across the Union" (NIS Directive)” at URL http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L1148&from=EN
NIST Cloud Computing Security Reference Architecture:NIST Special Publication 500-299 at URL http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf
- No prescribed texts.
European Commission (EC); “The Directive...concerning measures for a high common level of security of network and information systems across the Union" (NIS Directive)” at URL http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L1148&from=EN
NIST Cloud Computing Security Reference Architecture:NIST Special Publication 500-299 at URL http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf
Teaching and assessment
Fee information
Domestic
Commonwealth Supported courses
For information regarding Student Contribution Amounts please visit the Student Contribution Amounts.
Fee paying courses
For postgraduate or undergraduate full fee paying courses please check Domestic Postgraduate Fees OR Domestic Undergraduate Fees
International
Please check the international course and fee list to determine the relevant fees.