School: Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Wireless Security
Unit Code
CSG5308
Year
2016
Enrolment Period
1
Version
2
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
The unit will focus on securing wireless networks and related services. Students will be exposed to a wide range of techniques, tools and policy to secure wireless networks and wireless connected appliances. The unit will primarily examine problems relating to the 802.11 protocol suite.
Equivalent Rule
Unit was previously coded CSG3308, CSG4308
Learning Outcomes
On completion of this unit students should be able to:
- Analyse and investigate the main legal and ethical issues associated with security management of wireless security computing and networks.
- Analyse and review the wireless security requirements.
- Create a secure wireless network deployment.
- Develop and implement a range of policies to protect wireless networks.
- Evaluate and provide advice on the security issues associated with wireless networks, particularly with the 802.11 based family networks.
- Identify the appropriate countermeasures to address the wireless security issues.
- Identify the current wireless security issues and risks.
- Investigate appropriate security tools and auditing techniques to evaluate and protect wireless computing environments.
Unit Content
- Effective policy and planning for wireless security.
- Examining contemporary issues in wireless security.
- Legal and ethical implications of wireless security technologies and techniques.
- Logical countermeasures to wireless security issues.
- Physical countermeasures to wireless threats.
- RF Theory including modulation and antennas.
- Secure wireless deployment and planning.
- Vulnerabilities in wireless systems.
- Wireless IEEE Standards and their application.
- Wireless LAN topologies and hardware.
Additional Learning Experience Information
Lectures, workshops, case studies and practical exercises.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Report | Report on wireless network security | 20% |
Case Study | A current wireless network security deployment infrastructure | 30% |
Examination ^ | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Report | Report on wireless network security | 20% |
Case Study | A current wireless network security deployment infrastructure | 30% |
Examination ^ | End of semester examination | 50% |
^ Mandatory to Pass
Text References
- ^ David D. Coleman and David A. Westcott (2010). CWSP Certified Wireless Security Professional Official Study Guide. Sybex: John Wiley & Sons Ltd.
- Nichols, R. K., and Lekkas, P. C. (2002). Wireless security: models, threats, and solutions. London: McGraw-Hill.
- Ramachandran, V. (2011). Backtrack 5 wireless penetration testing beginner's guide (1st ed.). USA: Packt Publishing.
- Cache, J., Wright, J., Liu, V. (2010). Hacking exposed wireless (2nd ed.). New York: McGraw-Hill Osborne Media.
- Coleman, D., Westcott, D., Harkins, B., & Jackman, S. (2010). CWSP certified wireless security professional official study guide (1st ed.). Boston: Sybex.
- Xiao, Yang, Shen, Xuemin (Sherman), Du, Ding-Zhu (2007). Wireless Network Security.
- Peikari Cyrus (2006). Maximum Wireless Security.
- Vacca, John, R., (2006). Guide to Wireless Network. Security Springer.
- Andrew A. Vladimirov., Konstantin V. Gavrilenko and Adrei A. Mikhailovsky (2004). Wi-Foo: The Secrets of Wireless Hacking. Pearson/Addisson Wesley.
Journal References
- Wireless Network
- Computer Crime Digest
- Computer Security Journal
- Computers and Security
- Security
- Security Australia
- Security Management
- Security Systems Digest
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSG5308|2|1
School: Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Wireless Security
Unit Code
CSG5308
Year
2016
Enrolment Period
2
Version
2
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
The unit will focus on securing wireless networks and related services. Students will be exposed to a wide range of techniques, tools and policy to secure wireless networks and wireless connected appliances. The unit will primarily examine problems relating to the 802.11 protocol suite.
Equivalent Rule
Unit was previously coded CSG3308, CSG4308
Learning Outcomes
On completion of this unit students should be able to:
- Analyse and investigate the main legal and ethical issues associated with security management of wireless security computing and networks.
- Analyse and review the wireless security requirements.
- Create a secure wireless network deployment.
- Develop and implement a range of policies to protect wireless networks.
- Evaluate and provide advice on the security issues associated with wireless networks, particularly with the 802.11 based family networks.
- Identify the appropriate countermeasures to address the wireless security issues.
- Identify the current wireless security issues and risks.
- Investigate appropriate security tools and auditing techniques to evaluate and protect wireless computing environments.
Unit Content
- Effective policy and planning for wireless security.
- Examining contemporary issues in wireless security.
- Legal and ethical implications of wireless security technologies and techniques.
- Logical countermeasures to wireless security issues.
- Physical countermeasures to wireless threats.
- RF Theory including modulation and antennas.
- Secure wireless deployment and planning.
- Vulnerabilities in wireless systems.
- Wireless IEEE Standards and their application.
- Wireless LAN topologies and hardware.
Additional Learning Experience Information
Lectures, workshops, case studies and practical exercises.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Report | Report on wireless network security | 20% |
Case Study | A current wireless network security deployment infrastructure | 30% |
Examination ^ | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Report | Report on wireless network security | 20% |
Case Study | A current wireless network security deployment infrastructure | 30% |
Examination ^ | End of semester examination | 50% |
^ Mandatory to Pass
Text References
- ^ David D. Coleman and David A. Westcott (2010). CWSP Certified Wireless Security Professional Official Study Guide. Sybex: John Wiley & Sons Ltd.
- Andrew A. Vladimirov., Konstantin V. Gavrilenko and Adrei A. Mikhailovsky (2004). Wi-Foo: The Secrets of Wireless Hacking. Pearson/Addisson Wesley.
- Ramachandran, V. (2011). Backtrack 5 wireless penetration testing beginner's guide (1st ed.). USA: Packt Publishing.
- Cache, J., Wright, J., Liu, V. (2010). Hacking exposed wireless (2nd ed.). New York: McGraw-Hill Osborne Media.
- Coleman, D., Westcott, D., Harkins, B., & Jackman, S. (2010). CWSP certified wireless security professional official study guide (1st ed.). Boston: Sybex.
- Xiao, Yang, Shen, Xuemin (Sherman), Du, Ding-Zhu (2007). Wireless Network Security.
- Peikari Cyrus (2006). Maximum Wireless Security.
- Vacca, John, R., (2006). Guide to Wireless Network. Security Springer.
- Nichols, R. K., and Lekkas, P. C. (2002). Wireless security: models, threats, and solutions. London: McGraw-Hill.
Journal References
- Security Management
- Wireless Network
- Computer Crime Digest
- Computer Security Journal
- Computers and Security
- Security
- Security Australia
- Security Systems Digest
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSG5308|2|2