ITC358 IT Security (8)

This subject provides a comprehensive overview of the fundamental information security issues and concepts. Students will be introduced to the security threat environment as well as the security defensive mechanisms including cryptography, firewalls, host and application hardening and data protection techniques. Practices related to Information and Communication Technology (ICT) security management are also investigated. Risk identification, security planning and implementation of effective policy and practices will be covered.

Availability

Session 1 (30)
On Campus
Bathurst Campus
CSU Study Centre Melbourne
CSU Study Centre Sydney
Wagga Wagga Campus
Online
Wagga Wagga Campus

Continuing students should consult the SAL for current offering details: ITC358. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System

HD/FL

Duration

One session

School

School of Computing and Mathematics

Assumed Knowledge

Background knowledge at the level of ITC212 or ITC242

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to explain fundamental information security concepts;
  • be able to discuss and debate some of the security implications of computer networks, including cryptography;
  • be able to compare and contrast firewall technologies;
  • be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;
  • be able to evaluate some of the key application security concepts and practices;
  • be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.

Syllabus

This subject will cover the following topics:
  • Introduction to information security.
  • Cryptography and network security fundamentals.
  • Firewalls.
  • Host hardening.
  • Data protection.
  • Application security.
  • Security planning and policy.
  • Incident and disaster recovery.

The information contained in the CSU Handbook was accurate at the date of publication: January 2020. The University reserves the right to vary the information at any time without notice.

Back