Not offered in 2019
Provides students with advanced vendor-neutral cybersecurity knowledge for complex systems like Internet of Things (IoT). Students will learn about assessing, planning for and controlling cyber risks in contemporary organisations as well as national and international cybersecurity related laws, regulations and privacy issues. Students will research recent developments in cybersecurity solutions including Artificial Intelligence.
Topic 1: Cybersecurity security principles, models and management frameworks
Topic 2: Cyber threats, vulnerabilities and exploits
Topic 3: Cyber risk assessment
Topic 4: Cyber risk control
Topic 5: State-of-the-art techniques for cybersecurity
Topic 6: Cybersecurity for complex systems
Topic 7: Cybersecurity best practices
Topic 8: Planning for cybersecurity
Topic 9: Personnel security and privacy from IoT and Big Data perspectives
Topic 10: Cyber laws, policies and regulations
Topic 11: Evaluate and assess cybersecurity solutions
Topic 12: Trends in advanced cybersecurity techniques
Unit Learning Outcomes express learning achievement in terms of what a student should know, understand and be able to do on completion of a unit. These outcomes are aligned with the graduate attributes. The unit learning outcomes and graduate attributes are also the basis of evaluating prior learning.
Learning outcomes and graduate attributes
|On completion of this unit, students should be able to:||GA1||GA2||GA3||GA4||GA5||GA6||GA7|
|1||determine and critically assess cyber threats and risks to an organisation's information systems and propose appropriate measures to be taken||Ethical practice||Knowledge of a discipline|
|2||identify and evaluate recent trends in the use of advanced techniques including Artificial Intelligence in cyber security solutions||Knowledge of a discipline||Lifelong learning|
|3||critically analyse in-depth cybersecurity requirements by assessing pertinent laws and regulations at state, national and international levels||Knowledge of a discipline|
|4||develop comprehensive cyber security plans and policies for small-to-medium enterprise (SME)||Ethical practice||Knowledge of a discipline|
|5||propose solutions to advanced, persistent cyber threats and create recovery procedures for use after any successful penetration of an information system||Ethical practice||Knowledge of a discipline|
Teaching and assessment
Commonwealth Supported courses
For information regarding Student Contribution Amounts please visit the Student Contribution Amounts.
Commencing 2019 Commonwealth Supported only. Student contribution band: 2
Please check the international course and fee list to determine the relevant fees.