Note: This is an archived Handbook entry from 2010.
|Dates & Locations:|| |
This subject has the following teaching availabilities in 2010:Semester 1, Hawthorn - Taught on campus.
Semester 2, Hawthorn - Taught on campus.
Intensive Mode. See www.mccp.unimelb.edu.au for delivery details
Timetable can be viewed here. For information about these dates, click here.
|Time Commitment:||Contact Hours: 24 hours of face-to-face contact over an eight-week semester plus at least eight hours of pre-seminar reading |
Total Time Commitment: It is anticipated that students will need to allocate around 80 hours to undertake the assessable components of the subject to be completed in the three months encompassing the eight-week semester.
|Recommended Background Knowledge:||nil|
|Non Allowed Subjects:||nil|
|Core Participation Requirements:||For the purposes of considering requests for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Students Experiencing Academic Disadvantage Policy, academic requirements for this subject are articulated in the Subject Description, Subject Objectives, Generic Skills and Assessment Requirements of this entry. |
The University is dedicated to provide support to those with special requirements. Further details on the disability support scheme can be found at the Disability Liaison Unit website: http://www.services.unimelb.edu.au/disability/
Melbourne Consulting and Custom Programs
Level 3, 442 Auburn Rd
Hawthorn VIC 3122
Phone: 9810 3148
This course is no longer taking new enrolments. The last intake into this program was Semester 2, 2009.
This course presents strategic security models that can be readily employed in an integrated physical and information security landscape for the purposes of facility protection. Key themes involve the identification and protection of sensitive data across physical and cyber media. Defence in depth strategies and their application in an integrated physical/cyber landscape. Intelligence collection from physical and cyber technologies and strategies for detecting anomalous behaviour are also discussed. Risk management is also referenced as part of an overall security strategy.
|Objectives:||Students who successfully complete this subject will have demonstrated an understanding of: |
• Fundamental security strategies for facility protection;
• Identification and protection of data;
• Security Event Logging and its role in intelligence collection; and
• Security auditing and its role in facility protection.
|Assessment:||Two written assignments and a practical exam totalling 6000 words.|
|Recommended Texts:||Students will be provided with articles and references that support the teaching program as part of their course materials.|
|Breadth Options:|| |
This subject is not available as a breadth subject.
|Fees Information:||Subject EFTSL, Level, Discipline & Census Date|
|Generic Skills:||Please refer to www.mccp.unimelb.edu.au|
|Links to further information:||http://www.mccp.unimelb.edu.au/subjects/strategic-security-management|
Master of e-Forensics and Enterprise Security |
Download PDF version.