COMP 2027 Cyber Security
Credit Points 10
Coordinator Tomas Trescak Opens in new window
Description This subject focuses on, but is not limited to, the implementation and management of security and privacy policies of organisations within the standards and legal framework that is also applicable to the Australian standards. Knowledge gained in this subject will benefit students aspiring to careers in the Cyber Security industry.
School Computer, Data & Math Sciences
Discipline Computer Science
Student Contribution Band HECS Band 2 10cp
Check your fees via the Fees page.
Level Undergraduate Level 2 subject
Equivalent Subjects INFO 3001 - Computer Security
Assumed Knowledge
Students are expected to have general understanding on computer systems; computer fundamentals, databases, and web technologies.
Learning Outcomes
After successful completion of this subject, students will be able to:
- Explain the cyber security theories that are used in implementing a secure network/system in organisations
- Identify access operations and ownership issues using modern authentication, authorisation and access control mechanisms
- Explain various cryptographic techniques and algorithms in accomplishing security demonstrating knowledge of key concepts in symmetric and assymetric encryption and cryptography
- Examine security issues within various networked systems, operating systems and application software and the general causes that lead to system security failures
- Analyse the security issues specific to databases, and protection of sensitive information and statistical systems within an organisation
- Identify security threats and risks associated with web and related technologies
- Use corrective and preventative measures against these threats and risks in organisations
- Apply the relevant standards and the legal framework related to security and privacy and to security and privacy policies in organisations
Subject Content
- Complexities of working in the Cyber Security Industry
- Legal and ethical issues of working in cyber environment
- Threats, vulnerabilities, and exploits
- Network architectures and recognise their potential vulnerabilities
- Reconnaissance methodologies to discover weaknesses in computing environment
- The differences between vulnerability management policies and vulnerability management maturity models
- Concepts of exploiting vulnerabilities to hack into a system using common penetration testing tools and frameworks
- The principles of symmetric and asymmetric cryptography, and public key infrastructure
- Data classification levels and email marking standards associated with the dissemination of sensitive and classified information
- Data classification levels and email marking standards associated with the dissemination of sensitive and classified information
- Threats in social networks via Open Source Intelligence (OSINT) Methodologies and demonstrate the capturing of Personally Identifiable Information (PII) using OSINT
- Usage of website security assessment tools to identify weaknesses and potential web attack vectors
- The types of forensic investigations from a cybersecurity perspective, differentiating between software and hardware digital forensic tools
- The resources required to navigate the cybersecurity landscape as a potential cybersecurity professional
Assessment
The following table summarises the standard assessment tasks for this subject. Please note this is a guide only. Assessment tasks are regularly updated, where there is a difference your Learning Guide takes precedence.
Type | Length | Percent | Threshold | Individual/Group Task | Mandatory |
---|---|---|---|---|---|
Quizzes | 45 minutes (Weekly from Week 2) | 40 | N | Individual | N |
Quiz | 60 minutes | 20 | N | Individual | N |
Final Exam | 2 hours | 40 | N | Individual | Y |
Prescribed Texts
Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). Prentice Hall.
Teaching Periods
Autumn (2024)
Campbelltown
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Penrith (Kingswood)
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Melbourne
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Parramatta - Victoria Rd
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Spring (2024)
Parramatta - Victoria Rd
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Term 3 (2024)
Wsu Online
Online
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Sydney City Campus - Term 3 (2024)
Sydney City
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Autumn (2025)
Campbelltown
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Penrith (Kingswood)
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Melbourne
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Parramatta - Victoria Rd
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Sydney City Campus - Term 2 (2025)
Sydney City
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Spring (2025)
Parramatta - Victoria Rd
On-site
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Term 3 (2025)
Wsu Online
Online
Subject Contact Tomas Trescak Opens in new window
View timetable Opens in new window
Sydney City Campus - Term 3 (2025)
Sydney City
On-site
Subject Contact Tomas Trescak Opens in new window