School: Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Network Security
Unit Code
CSI6116
Year
2016
Enrolment Period
1
Version
1
Credit Points
20
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit covers the effective deployment, utilisation and monitoring of modern network security countermeasures to secure a network environment. The development of a secure network strategy through the use of advanced techniques and policy will be covered in this unit.
Prerequisite Rule
Students must pass 1 units from CSI4207, CSI5212
Equivalent Rule
Unit was previously coded CSI5107
Learning Outcomes
On completion of this unit students should be able to:
- Apply appropriate countermeasures to protect a network.
- Apply software tools to troubleshoot common network security problems.
- Design secure networks.
- Evaluate a network for vulnerabilities and implement effective risk reduction strategies.
- Execute a risk analysis and prepare an effective network usage policy.
- Execute effective research in the field of network security.
- Investigate and secure commonly used network services.
Unit Content
- Network Countermeasures deploy and implement a firewall. Deploy an Intrusion Detection System. Deploy a Virtual Private Network. Implement appropriate policy and procedures to reduce risk.
- Network Diagnostics - Utilise vulnerability scanners and other tools to diagnose or scan a network for vulnerabilities. Use proactive monitoring tools to monitor networks for problems and attacks.
- Network Forensics Utilise tools and techniques to troubleshoot and determine the causes and sources of security breaches.
- Risk Analysis identifying risks in a networked environ. Develop strategies for the reduction of identified risks.
- Secure Network Design Deploy a secure network design within a given framework.
Additional Learning Experience Information
Lectures, workshops and practical laboratory/online exercises.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Portfolio | Assessable Workshops | 20% |
Case Study | Network Security Case Study | 40% |
Research Paper | Network Security Academic Paper | 40% |
ONLINEType | Description | Value |
---|
Portfolio | Assessable Workshops | 20% |
Case Study | Network Security Case Study | 40% |
Research Paper | Network Security Academic Paper | 40% |
Text References
- ^ Chappell, L. (2013). Wireshark 101: Essential skills for network analysis (1st ed.). USA: Laura Chappell University.
- Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey., & G. Williams, T. (2011). Gray hat hacking: The ethical hackers handbook (3rd ed.). USA: McGraw Hill.
- Bejtlich, R. (2013). The practice of network security monitoring (1st ed.). USA: No Starch Press.
- Fichera, J., Bolt, S. (2012). Network intrusion analysis: Methodologies, tools, and techniques for incident analysis and response (1st ed.). USA: Syngress.
- Davidoff, S., Harn., J. (2012). Network forensics: Tracking hackers through cyberspace (1st ed.). USA: Prentice Hall.
Journal References
- Journal of Information Warfare
- Network Security
- Computers & Security
- Computer Fraud & Security
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI6116|1|1
School: Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Network Security
Unit Code
CSI6116
Year
2016
Enrolment Period
2
Version
1
Credit Points
20
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit covers the effective deployment, utilisation and monitoring of modern network security countermeasures to secure a network environment. The development of a secure network strategy through the use of advanced techniques and policy will be covered in this unit.
Prerequisite Rule
Students must pass 1 units from CSI4207, CSI5212
Equivalent Rule
Unit was previously coded CSI5107
Learning Outcomes
On completion of this unit students should be able to:
- Apply appropriate countermeasures to protect a network.
- Apply software tools to troubleshoot common network security problems.
- Design secure networks.
- Evaluate a network for vulnerabilities and implement effective risk reduction strategies.
- Execute a risk analysis and prepare an effective network usage policy.
- Execute effective research in the field of network security.
- Investigate and secure commonly used network services.
Unit Content
- Network Countermeasures deploy and implement a firewall. Deploy an Intrusion Detection System. Deploy a Virtual Private Network. Implement appropriate policy and procedures to reduce risk.
- Network Diagnostics - Utilise vulnerability scanners and other tools to diagnose or scan a network for vulnerabilities. Use proactive monitoring tools to monitor networks for problems and attacks.
- Network Forensics Utilise tools and techniques to troubleshoot and determine the causes and sources of security breaches.
- Risk Analysis identifying risks in a networked environ. Develop strategies for the reduction of identified risks.
- Secure Network Design Deploy a secure network design within a given framework.
Additional Learning Experience Information
Lectures, workshops and practical laboratory/online exercises.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Portfolio | Assessable Workshops | 20% |
Case Study | Network Security Case Study | 40% |
Research Paper | Network Security Academic Paper | 40% |
ONLINEType | Description | Value |
---|
Portfolio | Assessable Workshops | 20% |
Case Study | Network Security Case Study | 40% |
Research Paper | Network Security Academic Paper | 40% |
Text References
- ^ Chappell, L. (2013). Wireshark 101: Essential skills for network analysis (1st ed.). USA: Laura Chappell University.
- Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey., & G. Williams, T. (2011). Gray hat hacking: The ethical hackers handbook (3rd ed.). USA: McGraw Hill.
- Bejtlich, R. (2013). The practice of network security monitoring (1st ed.). USA: No Starch Press.
- Fichera, J., Bolt, S. (2012). Network intrusion analysis: Methodologies, tools, and techniques for incident analysis and response (1st ed.). USA: Syngress.
- Davidoff, S., Harn., J. (2012). Network forensics: Tracking hackers through cyberspace (1st ed.). USA: Prentice Hall.
Journal References
- Journal of Information Warfare
- Network Security
- Computers & Security
- Computer Fraud & Security
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI6116|1|2