Enterprise and Network Cyber Security is available as a postgraduate-level subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.
CYB601A
Core
600
4 credit points
Establishing a secure enterprise ecosystem is essential to safeguard corporate assets. This entails effectively assessing the security posture of an enterprise environment and implementing carefully designed security solutions. A well-modelled and securely architected enterprise system minimises the risk of falling victim to potential data breaches and damage to organisational infrastructure. Therefore, it is critical for ICT professionals to have a good grasp of cybersecurity practices, measures and technologies that are integral in securing communication networks.
This subject provides students with a holistic view of information security with an emphasis on the cybersecurity discipline, surveying the core elements of designing secure enterprise systems. Students will explore the critical aspects of attacks, threats and vulnerabilities in enterprise environments, developing and applying knowledge of hybrid networks, identity and access management, PKI, basic cryptography, wireless and end-to-end security.
In this subject, students will examine organisational security assessment tools and techniques, delving into the world of vulnerability analysis, network monitoring and proactive network service management, including cloud concepts. They will also study industry frameworks, standards and best practices used in cyber-governance, exploring the essential mechanisms to ensure business continuity, such as incident response, threat detection, risk treatment, security controls and digital forensics.
This subject is aligned with CompTIA Security+, a global certification that validates the baseline skills necessary to perform core security functions in the information security domain.
a) Interpret core information security functions related to cybersecurity issues, operations, architectural design, implementation and governance in an enterprise setting.
b) Categorise cyber threats, attacks, vulnerabilities and related technologies to monitor and secure hybrid network environments.
c) Deconstruct complex issues inherent in organisational security assessment and suggest solutions in line with industry best practices.
d) Assess cybersecurity events and incidents and prepare a cyber incident response plan incorporating appropriate mechanisms.
e) Critically evaluate intrusion and incident artefacts and formulate effective risk treatment strategies in line with the standards and frameworks used in cyber governance.
Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.
No | Assessment task | Weighting | Subject learning outcomes to be assessed |
1 | Online Quizzes (Invigilated) | Quiz 1 (15%) Quiz 2 (15%) | a, b |
2 | Report | 30% | a, b, c, e |
3 | Case Study (G) | 40% | a, b, c, d, e |
Topic: |
Week 1: Cybersecurity Threat Landscape
|
Week 2: Social Engineering, Physical, and Password Attacks
|
Week 3: Secure Coding
|
Week 4: Security Assessment and Testing
|
Week 5: Cryptography and the Public Key Infrastructure
|
Week 6: Identity and Access Management (IAM)
|
Week 7: Cloud and Virtualisation Security
|
Week 8: Endpoint Security
|
Week 9: Network, Wireless, and Mobile Security
|
Week 10: Digital Forensics and Incident Response (DFIR)
|
Week 11: Risk Management, Governance, and Compliance
|
Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.