Undergraduate LTU-CSE1CPR-2023
Cybersecurity In Practice
$1,037 $0
Your upfront cost: $0
Duration
12 weeks
Study method
100% Online
Available loans
- HECS-HELP
- FEE-HELP
Assessments
Subjects may require attendance
Prior study
Required
Start dates
- 31 Jul 2023
The third university established in Victoria, La Trobe University has a diverse community of more than 38,000 students and staff. Its commitment to excellence in teaching and research prepares students to make a bold and positive impact in today's global community. La Trobe provides Open Universities Australia with its core tenets, entrepreneurship and sustainability.
Learn more about La Trobe.
Explore La Trobe courses.
QS Ranking 2023
20
Times Higher Education Ranking 2023
16
Need help?
Our student advisors are here to guide you with:
- Enrolling and eligibility
- Fee and loan information
- Credit and recognition for prior learning
Subject details
Investigate, evaluate and apply current cybersecurity technologies that protect against cyber threats.
Describe the process of threat and vulnerability identification in cybersecurity environments.
Formulate and coordinate basic cyber incident responses.
Employ secure software design practices when working in teams.
-
- Computer security concepts and OSI security architecture.
- Structure and function of a cybersecurity organisation or department.
- Information classification based on sensitivity.
- Security frameworks and standards' bodies (NIST, ASD, ISO, ENISA, OWASP, ISF).
- Security threats and control themes.
- Network zoning based on trust.
- Look at the structure of network traffic and the function of the networking layers.
- Learn some important basic networking protocols.
- Network traffic control devices, such as firewalls and intrusion detection/prevention.
- Identification concepts.
- Real-world authentication.
- Internet identity and federation.
- The art and science of passwords.
- The Cyber Kill Chain.
- Security incident response.
- Human vulnerabilities.
- The challenges of security operations.
- Common software flaws; Sandboxing; OWASP top 10 web vulnerabilities.
You must have successfully completed the following subject(s) before starting this subject:
Additional requirements
No additional requirements
Every organisation and business that intends to protect itself from threats of cyber-attacks needs to know current practices in cyber defence. This subject will introduce common technologies used to identify and mitigate threats including firewalls, intrusion detection systems, intrusion protection systems and honeypots. This subject also introduces incident response processes and simple ways to incorporate secure programming practices to make computer programs less vulnerable to attacks.
- Written Report on current security technologies in practice (equivalent to 500 words) (10%)
- Report on threat and vulnerability identification (equivalent to 1000 words). This assignment has two parts: A written 500 word report and a 10 minute oral presentation (20%)
- Written Group submission on Software design practices (equivalent to 1000 words each) (30%)
- One 2-hour exam (equivalent to 2000 words) (40%)
For textbook details check your university's handbook, website or learning management system (LMS).