Overview

To develop knowledge and understanding of the strategies, techniques and technologies used in attacking and defending networks and how to design secure networks and protect against intrusion, malware and other hacker exploits. To understand the criminal business case given a network dump Learning Outcomes  On completion of this course, students … For more content click the Read More button below. Understand and evaluate the key issues involved in designing secure networksUnderstand the issues arising in the collection of computer evidence after network breachDevelop effective risk management plans to protect against malware and other hacking exploits Formulate a range of strategies and solutions for testing the security of a networkUnderstand  and debate the various ethical stances on privacy and security   Topics Methods of attacking and defending a network. Design of secure information infrastructure: servers, networks, firewalls, workstations, and intrusion detection systems. Intrusion detection and network monitoring techniques. Worms, viruses and other malware: operation, detection and response. Principles of penetration testing for assessment of system security. Hacker exploits, tools and countermeasures. Investigative techniques. Ethical, legal and privacy issues.    

Delivery

Fully online - Standard (usually weekly or fortnightly)
Fully online - Intensive

Course Outline

To access course outline please visit below link (Please note that access to UNSW Canberra course outlines requires VPN):

Fees

Pre-2019 Handbook Editions

Access past handbook editions (2018 and prior)