Cybersecurity In Practice
Your upfront cost: $0
Subjects may require attendance
- 31 Jul 2023
The third university established in Victoria, La Trobe University has a diverse community of more than 36,000 students and staff. Its commitment to excellence in teaching and research prepares students to make a bold and positive impact in today's global community. La Trobe provides Open Universities Australia with its core tenets, entrepreneurship and sustainability.
Learn more about La Trobe.
QS Ranking 2022
Times Higher Education Ranking 2022
Our student advisors are here to guide you with:
- Enrolling and eligibility
- Fee and loan information
- Credit and recognition for prior learning
Investigate, evaluate and apply current cybersecurity technologies that protect against cyber threats.
Describe the process of threat and vulnerability identification in cybersecurity environments.
Formulate and coordinate basic cyber incident responses.
Employ secure software design practices when working in teams.
- Computer security concepts and OSI security architecture.
- Structure and function of a cybersecurity organisation or department.
- Information classification based on sensitivity.
- Security frameworks and standards' bodies (NIST, ASD, ISO, ENISA, OWASP, ISF).
- Security threats and control themes.
- Network zoning based on trust.
- Look at the structure of network traffic and the function of the networking layers.
- Learn some important basic networking protocols.
- Network traffic control devices, such as firewalls and intrusion detection/prevention.
- Identification concepts.
- Real-world authentication.
- Internet identity and federation.
- The art and science of passwords.
- The Cyber Kill Chain.
- Security incident response.
- Human vulnerabilities.
- The challenges of security operations.
- Common software flaws; Sandboxing; OWASP top 10 web vulnerabilities.
No eligibility requirements
No additional requirements
Every organisation and business that intends to protect itself from threats of cyber-attacks needs to know current practices in cyber defence. This subject will introduce common technologies used to identify and mitigate threats including firewalls, intrusion detection systems, intrusion protection systems and honeypots. This subject also introduces incident response processes and simple ways to incorporate secure programming practices to make computer programs less vulnerable to attacks.
- Written Report on current security technologies in practice (equivalent to 500 words) (10%)
- Report on threat and vulnerability identification (equivalent to 1000 words). This assignment has two parts: A written 500 word report and a 10 minute oral presentation (20%)
- Written Group submission on Software design practices (equivalent to 1000 words each) (30%)
- One 2-hour exam (equivalent to 2000 words) (40%)
Current study term: 30 Jul 23 to 27 Oct 23
Textbook information is pending.