ITC358 IT Security (8)
Abstract
This subject provides a comprehensive overview of the fundamental information security issues and concepts. Students will be introduced to the security threat environment as well as the security defensive mechanisms including cryptography, firewalls, host and application hardening and data protection techniques. Practices related to Information and Communication Technology (ICT) security management are also investigated. Risk identification, security planning and implementation of effective policy and practices will be covered. |
|
|
+ Subject Availability Modes and Location
Session 1 | Internal | Albury-Wodonga Campus | Internal | Bathurst Campus | Internal | CSU Study Centre Melbourne | Internal | Wagga Wagga Campus | Distance | Wagga Wagga Campus | Session 2 | Internal | CSU Study Centre Sydney |
Continuing students should consult the SAL for current offering details: ITC358
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.
|
|
Subject informationDuration | Grading System | School: |
---|
One session | HD/FL | School of Computing and Mathematics |
|
|
Assumed Knowledge
Background knowledge at the level of ITC212 or ITC242
|
|
|
Learning OutcomesUpon successful completion of this subject, students should:
- be able to explain fundamental information security concepts;
- be able to discuss and debate some of the security implications of computer networks, including cryptography;
- be able to compare and contrast firewall technologies;
- be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;
- be able to evaluate some of the key application security concepts and practices;
- be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.
|
|
|
SyllabusThe subject will cover the following topics:
- Introduction to information security.
- Cryptography and network security fundamentals.
- Firewalls.
- Host hardening.
- Data protection.
- Application security.
- Security planning and policy.
- Incident and disaster recovery.
|
|
|
Back
The information contained in the 2016 CSU Handbook was accurate at the date of publication: 06 September 2016. The University reserves the right to vary the information at any time without notice.