CONTACT CSU

ITI581 Security Fundamentals (8)

Abstract

This subject provides an introduction to the field of IT security with a focus on the areas of information systems and internetworking. Students will first survey the IT security landscape before analysing key concepts in depth. Topics covered include authentication protocols, communication and network infrastructure security, basics of encryption, application and user security, operational and organisational security, and intrusion detection systems.

+ Subject Availability Modes and Location

Session 1
DistanceWagga Wagga Campus
Session 3
DistanceWagga Wagga Campus
Continuing students should consult the SAL for current offering details: ITI581
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLSchool of Computing and Mathematics

Enrolment restrictions

Only available to students enrolled in: Graduate Certificate in Information Systems Security
Master of Information Systems Security
Master of Management (Information Technology)
Prerequisite(s)
ITI500

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to construct and implement a security baseline for an organisation;
  • be able to justify an appropriate set of security policies for an organisation, and to ensure policy compliance;
  • be able to analyse the security threats to a network and propose effective countermeasures;
  • be able to apply security protection mechanisms, such as authentication and access control;
  • be able to investigate the cause of a security incident, and to respond as appropriate.

Syllabus

The subject will cover the following topics:
  • Network security
  • Network design elements and components
  • Compliance and operational security
  • Threats and vulnerabilities
  • Types of attacks
  • Risk mitigation strategies
  • Appropriate security controls
  • Disaster recovery plans and procedures
  • Application, data and host security
  • Access control and identity management
  • Cryptography
  • Intrusion detection systems

Back

The information contained in the 2015 CSU Handbook was accurate at the date of publication: 01 October 2015. The University reserves the right to vary the information at any time without notice.