e-Security Technologies
Subject ISYS90003 (2010)
Note: This is an archived Handbook entry from 2010.
Credit Points: | 12.50 | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Level: | 9 (Graduate/Postgraduate) | ||||||||||||||||||||||||
Dates & Locations: | This subject has the following teaching availabilities in 2010: Semester 1, Hawthorn - Taught on campus.
Semester 2, Hawthorn - Taught on campus.
Timetable can be viewed here. For information about these dates, click here. | ||||||||||||||||||||||||
Time Commitment: | Contact Hours: 24 hours of face-to-face contact over an eight-week semester plus at least eight hours of pre-seminar reading Total Time Commitment: It is anticipated that students will need to allocate around 80 hours to undertake the assessable components of the subject to be completed in the three months encompassing the eight-week semester. | ||||||||||||||||||||||||
Prerequisites: | nil | ||||||||||||||||||||||||
Corequisites: | nil | ||||||||||||||||||||||||
Recommended Background Knowledge: | nil | ||||||||||||||||||||||||
Non Allowed Subjects: | nil | ||||||||||||||||||||||||
Core Participation Requirements: | For the purposes of considering requests for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Students Experiencing Academic Disadvantage Policy, academic requirements for this subject are articulated in the Subject Description, Subject Objectives, Generic Skills and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the disability support scheme can be found at the Disability Liaison Unit website: http://www.services.unimelb.edu.au/disability/ |
Contact
Melbourne Consulting and Custom Programs
Level 3, 442 Auburn Rd
Hawthorn VIC 3122
Phone: 9810 3148
Email: mccp.enquiries@mccp.unimelb.edu.au
Subject Overview: | This subject is designed to provide students with a grounding in the foundations of IT security technologies and their influence on forensic investigations. Topics covered in this unit: Identification of sources of forensic data and the chain of evidence model; Systems security, including back-up and data protection strategies; Network security, including hacking tools and methods; Vulnerability testing and other security audit processes; Wireless technologies and their security challenges; Firewalls and Virtual Private Networks and their audit capabilities; and Intrusion Detection Systems and their logs. |
---|---|
Objectives: |
This course is no longer taking new enrolments. The last intake into this program was Semester 2, 2009. Students who successfully complete this subject will have demonstrated an understanding of: |
Assessment: |
Two written assignments and a practical exam totalling 6000 words. |
Prescribed Texts: | nil |
Recommended Texts: | Please refer to MCCP website. |
Breadth Options: | This subject is not available as a breadth subject. |
Fees Information: | Subject EFTSL, Level, Discipline & Census Date |
Generic Skills: | Please refer to MCCP website. |
Links to further information: | http://www.mccp.unimelb.edu.au/courses/award-courses/masters/e-forensics-enterprise-security |
Related Course(s): |
Master of e-Forensics and Enterprise Security |
Download PDF version.