Chat with us, powered by LiveChat

Security Operations and Identity Management

Security Operations and Identity Management is available as a postgraduate-level subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.

 

Subject Code:

CYB801A

Subject Type:

Specialisation 

Pre-requisites:

CYB601A Enterprise and Network Cyber Security 

CYB701A Cyber Security Management

ICT701A Software Design and Construction 

Course level study pre-requisite: a total of 16 credit points (4  subjects) prior to enrolling into the subject.

Co-Requisite:

CYB701A Cyber Security Management 

Subject Level:

800

Credit Points:

4 credit points

Subject Aim:

Due to the increasing threat of cyber-attacks, the secure operation of information resources is becoming a central challenge for companies. The two core activities here are security operations and identity management. Security operations are concerned with operating the IT environment – consisting of networks, computer systems and business applications – in accordance with the defined IT security level and external regulations. Moreover, ensuring the identity of an accessing resource (human, application, server) is of central importance to achieve information confidentiality and integrity. Thus, both effective security operations and effective identity management are the foundation for successfully defending against cyberattacks.

The goal of this subject is to enable students to critically analyse and continuously improve security operations and identity management configurations. Students will learn core concepts and techniques to critically analyse and evaluate existing security operations and identity management implementations. Finally, they will be able to develop independent solution designs according to specific business needs.

Learning Outcomes:

a) Critically analyse the effectiveness of security operation management practices within an organisation.

b) Design procedural (e.g., SLA) and technical solutions (firewalls, intrusion detection) to preventatively protect from cyber-attacks

c) Critically evaluate procedural and technical identity and access management solutions regarding threats to access control.

d) Design, develop and implement effective identity and access management solutions.

e) Effectively communicate security operations, identity and access management proposed solutions to a wide range of stakeholders in an organisational context

Assessment Information:

Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.

WordPress Table

Broad topics to be covered: 

Topic: 
Week 1:  Fundamentals of Security Operations 

  • Security Principals: Availability, Integrity, Confidentiality 
  • Internal and External Regulations 
  • Service Level Management 
Week 2:  Configuration Management 

  • Secure Resource Provisioning 
  • Network and Resource Availability 
Week 3: Techniques of Security Operations I 

  • Types of Firewalls 
  • Firewall Configurations 
  • Network Architecture and Demilitarised Zone 
Week 4: Techniques of Security Operations II 

  • Logging and Security Event Management 
  • Common Intrusion Detection Framework 
  • Anomaly Detection – Statistical Measures 
  • Model-based Intrusion Detection 
  • Transaction-based Anomaly Detection 
Week 5: Fundamentals of Identity and Access Management 

  • Identity Lifecycle Management 
  • Identification 
  • Authentication 
  • Authorisation 
  • Federation 
Week 6: Access Control Models 

  • Discretionary Access Control 
  • Mandatory Access Control 
  • Role-Based Access Control 
  • Rule-Based Access Control 
Week 7: Techniques of Identity and Access Management I 

  • Hashing 
  • Digital Signatures 
Week 8: Techniques of Identity and Access Management II 

  • Certificates 
  • Public Key Infrastructures 
Week 9: Techniques of Identity and Access Management III 

  • Single Sign-on 
  • Identity as a Service 
  • KERBEROS 
Week 10: Threats to Access Control 

  • Dictionary Attack 
  • Brute Force Attack 
  • Spoofing 
  • Pharming and Spear Phishing 
Week 11: Administrative Aspects of Security Operations and Identity Management 

  • Security Operations Centre 
  • Administrative Management: Roles, Accountability, Clipping Levels 

Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.