Overview
To develop knowledge and understanding of the strategies, techniques and technologies used in attacking and defending networks and how to design secure networks and protect against intrusion, malware and other hacker exploits. To understand the criminal business case given a network dump
Learning Outcomes
On completion of this course, students … For more content click the Read More button below.
Understand and evaluate the key issues involved in designing secure networksUnderstand the issues arising in the collection of computer evidence after network breachDevelop effective risk management plans to protect against malware and other hacking exploits Formulate a range of strategies and solutions for testing the security of a networkUnderstand and debate the various ethical stances on privacy and security
Topics
Methods of attacking and defending a network. Design of secure information infrastructure: servers, networks, firewalls, workstations, and intrusion detection systems. Intrusion detection and network monitoring techniques. Worms, viruses and other malware: operation, detection and response. Principles of penetration testing for assessment of system security. Hacker exploits, tools and countermeasures. Investigative techniques. Ethical, legal and privacy issues.
Delivery
Fully online - Standard (usually weekly or fortnightly)
Fully online - Intensive
Course Outline
To access course outline please visit below link (Please note that access to UNSW Canberra course outlines requires VPN):
Fees
Type | Amount |
---|---|
Commonwealth Supported Students (if applicable) | $N/A |
Domestic Students | $4140 |
International Students | $4980 |
Pre-2019 Handbook Editions
Access past handbook editions (2018 and prior)