e-Security Technologies

Subject ISYS90003 (2010)

Note: This is an archived Handbook entry from 2010.

Credit Points: 12.50
Level: 9 (Graduate/Postgraduate)
Dates & Locations:

This subject has the following teaching availabilities in 2010:

Semester 1, Hawthorn - Taught on campus.
Pre-teaching Period Start not applicable
Teaching Period not applicable
Assessment Period End not applicable
Last date to Self-Enrol not applicable
Census Date not applicable
Last date to Withdraw without fail not applicable

Semester 2, Hawthorn - Taught on campus.
Pre-teaching Period Start not applicable
Teaching Period not applicable
Assessment Period End not applicable
Last date to Self-Enrol not applicable
Census Date not applicable
Last date to Withdraw without fail not applicable


Timetable can be viewed here. For information about these dates, click here.
Time Commitment: Contact Hours: 24 hours of face-to-face contact over an eight-week semester plus at least eight hours of pre-seminar reading
Total Time Commitment: It is anticipated that students will need to allocate around 80 hours to undertake the assessable components of the subject to be completed in the three months encompassing the eight-week semester.
Prerequisites: nil
Corequisites: nil
Recommended Background Knowledge: nil
Non Allowed Subjects: nil
Core Participation Requirements: For the purposes of considering requests for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Students Experiencing Academic Disadvantage Policy, academic requirements for this subject are articulated in the Subject Description, Subject Objectives, Generic Skills and Assessment Requirements of this entry.
The University is dedicated to provide support to those with special requirements. Further details on the disability support scheme can be found at the Disability Liaison Unit website: http://www.services.unimelb.edu.au/disability/

Contact

Melbourne Consulting and Custom Programs

Level 3, 442 Auburn Rd

Hawthorn VIC 3122


Phone: 9810 3148
Email: mccp.enquiries@mccp.unimelb.edu.au

Subject Overview: This subject is designed to provide students with a grounding in the foundations of IT security technologies and their influence on forensic investigations. Topics covered in this unit:
 Identification of sources of forensic data and the chain of evidence model;
 Systems security, including back-up and data protection strategies;
 Network security, including hacking tools and methods;
 Vulnerability testing and other security audit processes;
 Wireless technologies and their security challenges;
 Firewalls and Virtual Private Networks and their audit capabilities; and
 Intrusion Detection Systems and their logs.
Objectives:

This course is no longer taking new enrolments. The last intake into this program was Semester 2, 2009.

Students who successfully complete this subject will have demonstrated an understanding of:
 The application of common security technologies
 Their strength and weaknesses, including the vulnerabilities that can be exploited to attack or bypass the security mechanisms used in these technologies.
 Their use as a source of forensic data and the use and limitations of this data in a forensic investigation.

Assessment:
Two written assignments and a practical exam totalling 6000 words.
Prescribed Texts: nil
Recommended Texts: Please refer to MCCP website.
Breadth Options:

This subject is not available as a breadth subject.

Fees Information: Subject EFTSL, Level, Discipline & Census Date
Generic Skills: Please refer to MCCP website.
Links to further information: http://www.mccp.unimelb.edu.au/courses/award-courses/masters/e-forensics-enterprise-security
Related Course(s): Master of e-Forensics and Enterprise Security

Download PDF version.