Security Operations and Identity Management is available as a postgraduate-level subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.
CYB801A
Specialisation
CYB601A Enterprise and Network Cyber Security
CYB701A Cyber Security Management
ICT701A Software Design and Construction
Course level study pre-requisite: a total of 16 credit points (4 subjects) prior to enrolling into the subject.
CYB701A Cyber Security Management
800
4 credit points
Due to the increasing threat of cyber-attacks, the secure operation of information resources is becoming a central challenge for companies. The two core activities here are security operations and identity management. Security operations are concerned with operating the IT environment – consisting of networks, computer systems and business applications – in accordance with the defined IT security level and external regulations. Moreover, ensuring the identity of an accessing resource (human, application, server) is of central importance to achieve information confidentiality and integrity. Thus, both effective security operations and effective identity management are the foundation for successfully defending against cyberattacks.
The goal of this subject is to enable students to critically analyse and continuously improve security operations and identity management configurations. Students will learn core concepts and techniques to critically analyse and evaluate existing security operations and identity management implementations. Finally, they will be able to develop independent solution designs according to specific business needs.
a) Critically analyse the effectiveness of security operation management practices within an organisation.
b) Design procedural (e.g., SLA) and technical solutions (firewalls, intrusion detection) to preventatively protect from cyber-attacks
c) Critically evaluate procedural and technical identity and access management solutions regarding threats to access control.
d) Design, develop and implement effective identity and access management solutions.
e) Effectively communicate security operations, identity and access management proposed solutions to a wide range of stakeholders in an organisational context
Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.
No | Assessment task | Weighting | Subject learning outcomes to be assessed |
1 | Online Quiz (Invigilated) | 20% | a |
2 | Security Operations Management Solution | 35% | a, b, c, e |
3 | Case Study: Identity and Access Management (G | 15% | c, d, e |
Part A Presentation | |||
Part B Report | 30% |
Topic: |
Week 1: Fundamentals of Security Operations
|
Week 2: Configuration Management
|
Week 3: Techniques of Security Operations I
|
Week 4: Techniques of Security Operations II
|
Week 5: Fundamentals of Identity and Access Management
|
Week 6: Access Control Models
|
Week 7: Techniques of Identity and Access Management I
|
Week 8: Techniques of Identity and Access Management II
|
Week 9: Techniques of Identity and Access Management III
|
Week 10: Threats to Access Control
|
Week 11: Administrative Aspects of Security Operations and Identity Management
|
Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.