Defensive Cyber Security and Procedures
Your upfront cost: $0
- 10 Jul 2023
Australia’s fourth oldest university, the University of Tasmania, is highly regarded internationally for teaching and academic excellence. The university offers more than 100 undergraduate degrees and more than 50 postgraduate programs across a range of disciplines. The university offers students a diverse range of opportunities, the chance to learn from leading experts, and excellent preparation for their future careers.
Learn more about UTAS.
Explore UTAS courses.
QS Ranking 2023
Times Higher Education Ranking 2023
Our student advisors are here to guide you with:
- Enrolling and eligibility
- Fee and loan information
- Credit and recognition for prior learning
Upon completion of this subject, the student should be able to:
- Analyse cyber security tools techniques and assets to identify and characterise threats and vulnerabilities in dynamic situations.
- Apply cyber security tools, techniques and methodologies to design and implement mitigation strategies and countermeasures.
- Evaluate and reflect on the effectiveness of penetration testing, mitigation strategies and countermeasures to generate professional recommendations.
- Concepts and Procedures Introduction
- Risk Assessment Techniques
- Threat Assessment Techniques
- Penetration Testing Tools
- Enumeration and Port Scanning
- Sniffing and Footprinting
- Network Testing and Monitoring
- Risk Assessment
- Managing Risk
- NIST Framework Applications
- Reviewing Policies and Procedures
- Conclusion, Certifications and Transferable Skills
No eligibility requirements
No additional requirements
In this subject, you will learn about the procedural nature of cyber security and the tools defined by the Open Web Application Security Project (OWASP). You will analyse the effectiveness of threat and vulnerability mitigation through use of contemporary cyber security frameworks. You will be exposed to mitigation strategies, operational controls and countermeasures needed to address various threats and vulnerabilities. Upon completion of this subject you will be able to apply your cyber security knowledge with the relevant tools and techniques to support and make improvements to business operations. In conjunction with the discipline theory, this subject builds on concepts of learning through practice in Year 1 of study by introducing you to more complex learning experiences. You will be introduced to: • discipline-based skills and knowledge in dynamic practice situations. This will include authentic and purposeful, industry-related experiences • concepts of managing effective relationships and communicating with others • the development and use of adaptive leadership skills and how these skills relate to innovative and entrepreneurial practice • the nature of responsible, accountable, and reflective workplace skills, and creative and critical thinking relevant to para-professional practice You will exercise self-awareness, initiative, and judgement to manage yourself and professional relationships effectively. The application of tacit knowledge and capabilities will be reflected in a Practice Manual.
- Malware Analysis and Defense Report (25%)
- Defensive Incident Response Plan (40%)
- Forensic Analysis Report (35%)
For textbook details check your university's handbook, website or learning management system (LMS).