Chat with us, powered by LiveChat

Enterprise and Network Cyber Security

Enterprise and Network Cyber Security is available as a postgraduate-level subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.

 

Subject Code:

CYB601A

Subject Type:

Core

Subject Level:

600

Credit Points:

4 credit points

Subject Aim:

Establishing a secure enterprise ecosystem is essential to safeguard corporate assets. This entails effectively assessing the security posture of an enterprise environment and implementing carefully designed security solutions. A well-modelled and securely architected enterprise system minimises the risk of falling victim to potential data breaches and damage to organisational infrastructure. Therefore, it is critical for ICT professionals to have a good grasp of cybersecurity practices, measures and technologies that are integral in securing communication networks.

This subject provides students with a holistic view of information security with an emphasis on the cybersecurity discipline, surveying the core elements of designing secure enterprise systems. Students will explore the critical aspects of attacks, threats and vulnerabilities in enterprise environments, developing and applying knowledge of hybrid networks, identity and access management, PKI, basic cryptography, wireless and end-to-end security.

In this subject, students will examine organisational security assessment tools and techniques, delving into the world of vulnerability analysis, network monitoring and proactive network service management, including cloud concepts. They will also study industry frameworks, standards and best practices used in cyber-governance, exploring the essential mechanisms to ensure business continuity, such as incident response, threat detection, risk treatment, security controls and digital forensics.

This subject is aligned with CompTIA Security+, a global certification that validates the baseline skills necessary to perform core security functions in the information security domain.

Learning Outcomes:

a) Interpret core information security functions related to cybersecurity issues, operations, architectural design, implementation and governance in an enterprise setting.

b) Categorise cyber threats, attacks, vulnerabilities and related technologies to monitor and secure hybrid network environments.

c) Deconstruct complex issues inherent in organisational security assessment and suggest solutions in line with industry best practices.

d) Assess cybersecurity events and incidents and prepare a cyber incident response plan incorporating appropriate mechanisms.

e) Critically evaluate intrusion and incident artefacts and formulate effective risk treatment strategies in line with the standards and frameworks used in cyber governance.

Assessment Information:

Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.

Broad topics to be covered:

Topic: 
Week 1: Cybersecurity Threat Landscape 

  • Criminology and cybersecurity objectives 
  • The CIA triad and the DAD triad 
  • Data breaches and data protection 
  • Cybersecurity threats, threat data, and threat intelligence 
  • Malicious code 
  • Adversarial artificial intelligence 
Week 2: Social Engineering, Physical, and Password Attacks 

  • Social engineering – the science of human hacking 
  • Social engineering techniques 
  • Password attacks 
  • Physical attacks 
Week 3: Secure Coding 

  • The Software Development Life Cycle and software development models 
  • Secure coding practices and API security 
  • Code review models and software security testing 
  • Injection vulnerabilities 
  • Exploiting authentication, authorisation, and web application vulnerabilities 
  • Application security controls and secure coding practices 
Week 4: Security Assessment and Testing 

  • Vulnerability management 
  • Vulnerability scanning 
  • Reviewing and interpreting scan reports and validating scan results 
  • Security vulnerabilities 
  • Penetration testing and threat hunting 
Week 5: Cryptography and the Public Key Infrastructure 

  • Overview of cryptography, its goals, and role in the CIA triad 
  • Cryptographic concepts and attacks 
  • Modern cryptography 
  • Symmetric cryptography and asymmetric cryptography 
  • Hash functions 
  • Digital signatures 
  • PKI concepts and asymmetric key management 
  • Emerging issues in cryptography 
Week 6: Identity and Access Management (IAM) 

  • Identity 
  • Authentication and authorisation 
  • Authentication methods 
  • Accounts 
  • Access control schemes 
  • Physical security controls 
Week 7: Cloud and Virtualisation Security 

  • Cloud, the benefits, roles, service models, and deployment models  
  • Virtualisation 
  • Cloud infrastructure components 
  • Cloud security issues and controls 
Week 8: Endpoint Security 

  • Protecting endpoints 
  • Service hardening 
  • Operating system hardening 
  • Securing embedded and specialised systems 
Week 9: Network, Wireless, and Mobile Security 

  • Designing secure networks 
  • Secure network protocols 
  • Attacking and assessing networks 
  • Network reconnaissance and discovery tools and techniques 
  • Building secure wireless networks 
  • Managing secure mobile devices 
Week 10: Digital Forensics and Incident Response (DFIR) 

  • Incident response cycle 
  • Incident response data and tools 
  • Mitigation and recovery 
  • Digital forensic concepts 
  • Conducting digital forensics and reporting 
  • Digital forensics and intelligence 
  • DFIR and data recovery 
Week 11: Risk Management, Governance, and Compliance 

  • Analysing and managing risks 
  • Disaster recovery planning 
  • Third-party risk management 
  • Information security policies, ISO standards (27001, 27002, 27701, 31000), and frameworks (NIST Cybersecurity Framework) 
  • Personnel management 
  • Privacy 
  • Compliance with laws and regulations 

Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.