Chat with us, powered by LiveChat

Advanced Topics in Cyber Security

Advanced Topics in Cyber Security is available as a postgraduate-level subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.

 

Subject Code:

CYB803A

Subject Type:

Specialisation 

Pre-requisite/s:

CYB601A Enterprise and Network Cyber Security 

CYB701A Cyber Security Management 

ICT701A Software Design and Construction 

Course level study pre-requisite: a total of 16 credit points (4 subjects) prior to enrolling into the subject. 

Subject Level:

800

Credit Points:

4 credit points

Subject Aim:

Innovative technologies, and advances in artificial intelligence (AI) in particular, are not only enabling new business models for companies. They also have a tremendous impact on cyber security. On the one hand, AI enables novel forms of cyber-attacks. It has become one of the top concerns for managers when defending against AI-driven cyber-attacks. On the other hand, AI methods and technological innovations such as Blockchain enable mitigation of threats from cyber-attacks. For example, they help to automatically detect cyber-attacks at an early stage or they enable secure and trustworthy storage of distributed data. AI as a security threat and AI for security threat mitigation are thus becoming key areas of competence for successful companies and professionals.

The goal of this subject is for students to engage critically with both, AI as a security threat and AI for security threat mitigation. Students are enabled to independently perform AI-based attacks in the sense of penetration testing and white-hat hacking. They also learn to evaluate the consequences for companies. In addition, students examine modern AI-based techniques in order to assess their potential in threat mitigation. Finally, they learn hands-on skills to develop AI-based tools for business use. After completion of this subject, students will be able to participate in projects that demand knowledge of latest trends and technologies to be adapted by organisations for value creation.

Learning Outcomes:

a) Investigate advancements in (AI-based) cyber-attacks and critically analyse their contextual threat for organisations.

b) Perform AI-based attacks through penetration testing and white-hat hacking, and critically evaluate the organisational consequences.

c) Design and implement advanced AI and blockchain technologies for threat management, network management, and data security.

d) Justify and defend the contextual necessity of AI-based and blockchain technologies for threat mitigation in IT projects

Assessment Information:

Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.

Broad topics to be covered: 

Topic: 
Week 1:  Fundamentals of Cybersecurity and AI methods I 

  • Cybersecurity in and by AI 
  • Introduction to AI Methods 
  • Fundamentals of AI libraries in Python 
Week 2:  Fundamentals of Cybersecurity and AI methods II 

  • Python – Organising data-training and testing 
  • Python – Creating ML model 
  • Python – Train ML model 
  • Python – Predict test set result and evaluate accuracy 
Week 3: AI-based White Hacking I: Principles  

  • Penetration Testing and Ethics Behind White Hacking 
  • AI-based Social Engineering Threats 
  • Methods in AI-based Social Engineering 
Week 4: AI-based White Hacking II: Coding Challenge 

  • Case Presentation 
  • AI Methods (Hands-on) 
Week 5: AI-based Threat Management: Principles and Coding Challenge 

  • Strategic Security Event Data in Organisations 
  • Case Presentation 
  • AI Methods (Hands-on) 
Week 6: AI in Secure Network Management I: Principles 

  • Threats in Network Security 
  • AI-based Intrusion Detection 
  • Methods in AI-based Intrusion Detection 
Week 7: AI in Secure Network Management II: Coding Challenge 

  • Case Presentation 
  • AI Methods (Hands-on) 
Week 8: AI in Secure Application Development I: Principles 

  • AI in Software Development 
  • Security Threat Vectors in AI Applications 
  • Protection Methods against Cyber Attacks on AI in Software Solutions 
Week 9: AI in Secure Application Development II: Coding Challenge 

  • Case Presentation 
  • Implementing Protection Methods (Hands-on) 
Week 10: Blockchain Technology for Threat Mitigation I: Principles 

  • Blockchain Principles  
  • Blockchain Technologies 
Week 11: Blockchain Technology for Threat Mitigation II: Applications 

  • Use Cases I: Focus on Non-repudiation  
  • Use Cases II: Focus on Distributed trust  

Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.