ITC358 IT Security (8)


This subject provides a comprehensive overview of the  fundamental information security issues and concepts. Students will be introduced to the security threat environment as well as the security defensive mechanisms including cryptography, firewalls, host and application hardening and data protection techniques. Practices related to Information and Communication Technology (ICT) security management are also investigated. Risk identification, security planning and implementation of effective policy and practices will be covered.

+ Subject Availability Modes and Location

Session 1
InternalAlbury-Wodonga Campus
InternalBathurst Campus
InternalCSU Study Centre Melbourne
InternalWagga Wagga Campus
DistanceWagga Wagga Campus
Session 2
InternalCSU Study Centre Sydney
Continuing students should consult the SAL for current offering details: ITC358
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLSchool of Computing and Mathematics

Assumed Knowledge

Background knowledge at the level of ITC212 or ITC242

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to explain fundamental information security concepts;
  • be able to discuss and debate some of the security implications of computer networks, including cryptography;
  • be able to compare and contrast firewall technologies;
  • be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;
  • be able to evaluate some of the key application security concepts and practices;
  • be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.


The subject will cover the following topics:
  • Introduction to information security.
  • Cryptography and network security fundamentals.
  • Firewalls.
  • Host hardening.
  • Data protection.
  • Application security.
  • Security planning and policy.
  • Incident and disaster recovery.


The information contained in the 2016 CSU Handbook was accurate at the date of publication: 06 September 2016. The University reserves the right to vary the information at any time without notice.