Note: This is an archived Handbook entry from 2010.
|Dates & Locations:|| |
This subject has the following teaching availabilities in 2010:Semester 1, Hawthorn - Taught on campus.
Semester 2, Hawthorn - Taught on campus.
Please refer to www.mccp.unimelb.edu.au for details
Timetable can be viewed here. For information about these dates, click here.
|Time Commitment:||Contact Hours: 24 hours of face-to-face contact over an eight-week semester plus at least eight hours of pre-seminar reading |
Total Time Commitment: It is anticipated that students will need to allocate around 100 hours to undertake the assessable components of the subject.
|Recommended Background Knowledge:||nil|
|Non Allowed Subjects:|| |
|Core Participation Requirements:||For the purposes of considering requests for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Students Experiencing Academic Disadvantage Policy, academic requirements for this subject are articulated in the Subject Description, Subject Objectives, Generic Skills and Assessment Requirements of this entry. |
The University is dedicated to provide support to those with special requirements. Further details on the disability support scheme can be found at the Disability Liaison Unit website: http://www.services.unimelb.edu.au/disability/
Melbourne Consulting and Custom Programs
Phone: 9810 3148
This course is no longer taking new enrolments. The last intake into this program was Semester 2, 2009.
Within the subject, the theoretical, technical and practical aspects of network security are covered. Specific content will deal with technical fundamentals of inter/intranets, examine examples of network based crimes and network based attacks, and cover in detaila number of the tools and techniques used to detect and prevent misuse. It will include in-depth technical descriptions of security technologies and architectural and design approaches to securing systems. This is a practical subject, and a significant amount of the contact time will be hands-on experiences with the tools and techniques that are discussed.
|Objectives:||Students who successfully complete this subject will have demonstrated an understanding of: |
The theoretical and practical frameworks, protocols and structures underlying the internet and other networks
The application of common electronic security technologies
Their strength and weaknesses, including the vulnerabilities that can be exploited to attack or bypass the security mechanisms used in these technologies.
Approaches to prevention of network misuse
|Assessment:||Up to two written assignments totalling 4000 words.|
|Breadth Options:|| |
This subject is not available as a breadth subject.
|Fees Information:||Subject EFTSL, Level, Discipline & Census Date|
|Generic Skills:||Please refer to MCCP website.|
|Links to further information:||http://www.mccp.unimelb.edu.au/subjects/network-security|
Graduate Certificate in Digital Forensics |
Download PDF version.