School: Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Network Security Fundamentals
Unit Code
CSI3207
Year
2016
Enrolment Period
1
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit is an introduction to securing modern networks with a particular focus on TCP/IP based systems. Students will develop an understanding of modern tools and techniques that can be deployed to secure a network.
Prerequisite Rule
Students must pass 1 units from CSI1101
Equivalent Rule
Unit was previously coded CSI4207, CSI5212
Learning Outcomes
On completion of this unit students should be able to:
- Advise on security issues associated with networks and suggest mitigation strategies.
- Apply network auditing and analysis tools to investigate or prevent network security incidents.
- Create appropriate policy, guidelines and procedures for the deployment of network security countermeasures.
- Describe various network vulnerabilities and their subsequent remedy via the use of appropriate countermeasures.
- Detail current network security issues.
- Implement a secure network through configuration of appropriate network protocols and services.
- Perform a vulnerability assessment on network infrastructure.
- Perform simple penetration testing on networks and network services.
Unit Content
- Auditing Systems - Basic Forensics and Systems Penetration Testing.
- Firewall Concepts and Topology.
- Firewall Configuration.
- Hardening a Network - Part 1 Basic Services.
- Hardening a Network - Part 2 - Cryptographic Tools.
- Honeypots.
- Intrusion Detection System Concepts.
- Intrusion Detection: Incident Response.
- Network Defense Fundamentals (TCP/IP etc).
- Network Traffic Signatures.
- Security Policy Design and Implementation.
- Virtual Private Network (VPN) Concepts and Implementation.
Additional Learning Experience Information
Lectures, workshops and practical exercises.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Laboratory Work | Practical Exercises conducted using the supplied materials | 10% |
Case Study | Network Security | 40% |
Examination | End of Semester Examination | 50% |
ONLINEType | Description | Value |
---|
Laboratory Work | Practical Exercises conducted using the supplied materials | 10% |
Case Study | Network Security | 40% |
Examination | End of Semester Examination | 50% |
Text References
- ^ Bragg, R, Rhodes-Ousley, M & Strassberg, K (2003). Network Security: The Complete Reference. Emeryville, Calif: McGraw-Hill/Osborne.
- Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey. & G. Williams, T. (2011). Gray hat hacking: The ethical hackers handbook (3rd ed.). USA: McGraw Hill.
- Pfleeger, C.P. & Pfleeger, S.L. (2012). Analyzing Computer Security: A threat/countermeasure approach. New Jersey: Prentice Hall.
- Chappell, L. (2013). Wireshark 101: Essential skills for network analysis (1st ed.). USA: Laura Chappell University.
- Whitman, M.E., Mattord, H.J., Mackey, D. & Green, A. (2013). Guide to Network Security (1st ed.). USA: Cengage.
Journal References
- Network Security
- Computers and Security
- Computer Security Journal
- Computer Crime Digest
- Security
- Security Australia
- Security Management
- Security Systems Digest
- Journal of Information Warfare
- Virus Bulletin
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI3207|1|1
School: Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Network Security Fundamentals
Unit Code
CSI3207
Year
2016
Enrolment Period
2
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit is an introduction to securing modern networks with a particular focus on TCP/IP based systems. Students will develop an understanding of modern tools and techniques that can be deployed to secure a network.
Prerequisite Rule
Students must pass 1 units from CSI1101
Equivalent Rule
Unit was previously coded CSI4207, CSI5212
Learning Outcomes
On completion of this unit students should be able to:
- Advise on security issues associated with networks and suggest mitigation strategies.
- Apply network auditing and analysis tools to investigate or prevent network security incidents.
- Create appropriate policy, guidelines and procedures for the deployment of network security countermeasures.
- Describe various network vulnerabilities and their subsequent remedy via the use of appropriate countermeasures.
- Detail current network security issues.
- Implement a secure network through configuration of appropriate network protocols and services.
- Perform a vulnerability assessment on network infrastructure.
- Perform simple penetration testing on networks and network services.
Unit Content
- Auditing Systems - Basic Forensics and Systems Penetration Testing.
- Firewall Concepts and Topology.
- Firewall Configuration.
- Hardening a Network - Part 1 Basic Services.
- Hardening a Network - Part 2 - Cryptographic Tools.
- Honeypots.
- Intrusion Detection System Concepts.
- Intrusion Detection: Incident Response.
- Network Defense Fundamentals (TCP/IP etc).
- Network Traffic Signatures.
- Security Policy Design and Implementation.
- Virtual Private Network (VPN) Concepts and Implementation.
Additional Learning Experience Information
Lectures, workshops and practical exercises.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Laboratory Work | Practical Exercises conducted using the supplied materials | 10% |
Case Study | Network Security | 40% |
Examination | End of Semester Examination | 50% |
ONLINEType | Description | Value |
---|
Laboratory Work | Practical Exercises conducted using the supplied materials | 10% |
Case Study | Network Security | 40% |
Examination | End of Semester Examination | 50% |
Text References
- ^ Bragg, R, Rhodes-Ousley, M & Strassberg, K (2003). Network Security: The Complete Reference. Emeryville, Calif: McGraw-Hill/Osborne.
- Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey. & G. Williams, T. (2011). Gray hat hacking: The ethical hackers handbook (3rd ed.). USA: McGraw Hill.
- Pfleeger, C.P. & Pfleeger, S.L. (2012). Analyzing Computer Security: A threat/countermeasure approach. New Jersey: Prentice Hall.
- Chappell, L. (2013). Wireshark 101: Essential skills for network analysis (1st ed.). USA: Laura Chappell University.
- Whitman, M.E., Mattord, H.J., Mackey, D. & Green, A. (2013). Guide to Network Security (1st ed.). USA: Cengage.
Journal References
- Journal of Information Warfare
- Computers and Security
- Computer Security Journal
- Computer Crime Digest
- Network Security
- Security
- Security Australia
- Security Management
- Virus Bulletin
- Security Systems Digest
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI3207|1|2