Enrolments for 2018 have closed.
Security in Computing and IT
Undergraduate | RMI-CPT251 | 2018
Course information for 2018 intake
View information for 2019 course intakeSecure a solid technical grasp of IT security systems. Clarify and assess security measures and privacy issues across diverse digital platforms. Verify and protect data.Lock in a career as an IT security expert in a high demand, growth industry.
- Study method
- 100% online
- Assessments
- Subject may require attendance
- Entry requirements
- Prior study needed
- Duration
- 13 weeks
HECS-HELP and FEE-HELP available
Security in Computing and IT
About this subject
Upon successful completion of the subject students will be able to:
- explain the functioning of security services in computing environments and the security issues in mobile computing
- discuss the types and attack strategies of malware
- describe basic system security mechanisms, such as those used in operating systems, file systems and computer networks
- analyse the overarching importance of IT security in areas such as networking, databases, operating systems, and web systems
- apply privacy principles in basic practical settings in IT environments
- analyse and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing.
- Introduction
- Security mechanisms, attack methods
- Elementary cryptography
- Authentication
- Access control
- Operating system security
- Database security
- Network security
- Web security
- Mobile computing
- Privacy
- Internet banking
- Security has become a focal area in IT; it has grown and evolved significantly in recent years and different areas of specialisation have emerged.This subject gives an introduction to technical aspects of security for future IT professionals, and presents the foundations. It looks at the different security mechanisms used in various areas of computing, including operating systems, databases and web-based applications.For computer systems that are used and relied upon in many areas of life, security has become an important aspect; availability and correct operation are essential. IT professionals working in the field need to be well acquainted with the security features of the tools and applications they use and produce. Protection of data regardless of the information they contain is a critical task, and requires expertise.
- Invigilated Exam (50%)
- Assignment 2 (25%)
- Assignment 1 (10%)
- Online Test(s) (15%)
For textbook details check your university's handbook, website or learning management system (LMS).
One of Australia's largest dual-sector institutes, offering both TAFE and higher education, RMIT University proudly delivers work-related education and practical research relevant to current business and community needs. More than 96,000 students study with RMIT, and many of their degrees are available through Open Universities Australia.
Learn more about RMIT University.
Explore RMIT courses.
- QS Ranking 2024:
- 11
- Times Higher Education Ranking 2024:
- 16
Entry requirements
Prior study
To help set you up for success before you start this subject, we suggest completing or having equivalent knowledge in:
Additional requirements
- Other requirements -
Stable broadband connection required to access online learning materials and live chat sessions / recordings. (note: mobile broadband users may have difficulties participating in live chat sessions)
Study load
- 0.125 EFTSL
- This is in the range of 10 to 12 hours of study each week.
Equivalent full time study load (EFTSL) is one way to calculate your study load. One (1.0) EFTSL is equivalent to a full-time study load for one year.
Find out more information on Commonwealth Loans to understand what this means to your eligibility for financial support.
Single subject FAQs
Single subjects are the individual components that make up a degree. With Open Universities Australia, you’re able to study many of them as stand-alone subjects, including postgraduate single subjects, without having to commit to a degree.
Each of your subjects will be held over the course of a study term, and they’ll usually require 10 to 12 hours of study each week. Subjects are identified by a title and a code, for example, Developmental Psychology, PSY20007.
First, find the degree that you would like to study on our website.
If that degree allows entry via undergraduate subjects, there will be information about this under the Entry Requirements section. You will find a list of 2-4 open enrolment subjects you need to successfully complete to qualify for admission into that qualification.
Once you pass those subjects, you will satisfy the academic requirements for the degree, and you can apply for entry.
Our student advisors are here to help you take that next step, so don’t hesitate to reach out when you’re ready! We’ve also made it easier to figure out the right way to get started on our pathways page.
Our student advisors are more than happy to help you plan your online study. Get in touch with an advisor by:
You can pay up front with your credit card, or you may be eligible for a HELP loan from the Australian government depending on your citizenship status and where you’ll live during your studies.
For more information about how to pay for your studies visit our fees page or contact a student advisor.
When you’ve made your choice, click ‘Enrol now’ on the relevant course page and follow the prompts to begin your enrolment. We’ll ask you to supply some supporting documentation, including proof of your identity, your tax file number, and a unique student identifier (USI) during this process.
Your university will get in touch with you via email to confirm whether or not your application has been successful.
If you get stuck at any time, reach out to us and we’ll talk you through it.
You can also take a look at our online self-service enrolling instructions .
Close of enrolment times vary between universities and subjects. You can check the cut-off dates for upcoming study terms by visiting key dates.