Network Security

Subject 360-808 (2009)

Note: This is an archived Handbook entry from 2009. Search for this in the current handbook

Credit Points: 12.50
Level: 9 (Graduate/Postgraduate)
Dates & Locations:

This subject has the following teaching availabilities in 2009:

For information about these dates, click here.
Time Commitment: Total Time Commitment: Not available
Prerequisites: None
Corequisites: None
Recommended Background Knowledge: None
Non Allowed Subjects: None
Core Participation Requirements:

For the purposes of considering request for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Student Support and Engagement Policy, academic requirements for this subject are articulated in the Subject Overview, Learning Outcomes, Assessment and Generic Skills sections of this entry.

It is University policy to take all reasonable steps to minimise the impact of disability upon academic study, and reasonable adjustments will be made to enhance a student's participation in the University's programs. Students who feel their disability may impact on meeting the requirements of this subject are encouraged to discuss this matter with a Faculty Student Adviser and Student Equity and Disability Support: http://services.unimelb.edu.au/disability

Subject Overview:

Within the subject, the theoretical, technical and practical aspects of network security are covered. Specific content will deal with technical fundamentals of inter/intranets, examine examples of network based crimes and network based attacks, and cover in detaila number of the tools and techniques used to detect and prevent misuse. It will include in-depth technical descriptions of security technologies and architectural and design approaches to securing systems. This is a practical subject, and a significant amount of the contact time will be hands-on experiences with the tools and techniques that are discussed.
It offers students an understanding of:-

  • the theoretical and practical frameworks of networks including the Internet
  • protocols and structures underlying the main uses and misuses of the Internet such as email, newsgroups, Web browsing, hacking, and file transfer
  • the tools, techniques and equipment that are used for constructing, securing and auditing networks and systems
  • best practice approaches to the design and architecture of secure networks and systems and their implementation
Prescribed Texts: None
Breadth Options:

This subject is not available as a breadth subject.

Fees Information: Subject EFTSL, Level, Discipline & Census Date
Related Course(s): Graduate Certificate in Digital Forensics

Download PDF version.