Note: This is an archived Handbook entry from 2014.
|Dates & Locations:|| |
This subject is not offered in 2014.
|Time Commitment:||Contact Hours: 36 hours in June/July |
Total Time Commitment:
|Recommended Background Knowledge:|| |
|Non Allowed Subjects:|| |
|Core Participation Requirements:||
For the purposes of considering request for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Students Experiencing Academic Disadvantage Policy, academic requirements for this subject are articulated in the Subject Overview, Objectives, Assessment and Generic Skills sections of this entry.
It is University policy to take all reasonable steps to minimise the impact of disability upon academic study, and reasonable adjustments will be made to enhance a student's participation in the University's programs. Students who feel their disability may impact on meeting the requirements of this subject are encouraged to discuss this matter with a Faculty Student Adviser and the Disability Liaison Unit: http://www.services.unimelb.edu.au/disability/
This subject introduces a range of information security consulting services typically provided by leading management consultants in industry. The subject will cover the fundamental principles and practice of security risk assessment, incident response and disaster recovery, knowledge leakage, systems and network security, and policy and culture. Students will develop an appreciation for the kinds of consulting services that can be developed and marketed to industry in each of these areas. Consulting techniques in proposal writing, pricing, and marketing to prospective clients will also be discussed.
This subject supports course-level objectives by allowing students to have in-depth knowledge of the specialist area of information security management. The subject’s assessment tasks include the writing of a comprehensive consulting proposal and research into critical security issues faced by organizations. These tasks will encourage students to work in a team to develop a high-level of achievement in writing, research activities, and presentation skills.
Security principles and techniques discussed are: Models for understanding knowledge leakage, Security Risk Assessment Methods including OCTAVE, Firewall and VPN security scenarios, SANS Incident Response Methodology. Real world cases will be drawn from a range of organization types including critical infrastructure installations in Australia.
Intended Learning Outcomes (ILO)
On completion of this subject the student is expected to:
|Prescribed Texts:|| |
|Recommended Texts:|| |
A range of readings will be provided during the course, including current articles and reports.
|Breadth Options:|| |
This subject is not available as a breadth subject.
|Fees Information:||Subject EFTSL, Level, Discipline & Census Date|
On completion of this subject, students should have developed the following generic skills:
Learning and Teaching Methods
The subject is delivered over three weekends in 6 hour classes where each class contains a series of lecture presentations, collaborative discussion and activities, and self-study of research related articles.
Indicative Key Learning Resources
Students will have access to lecture slides as well as a range of research articles and real-world cases will be provided through the subject LMS site.
This subject is relevant to students pursuing management consulting careers as well as IT professionals in general. Students will be studying real-world security challenges to organizations and developing realistic consulting proposals. The lecturer is formerly a security consultant and guest speakers from industry will also be invited.
Master of Information Systems |
Master of Information Systems
Master of Information Systems
Master of Philosophy - Engineering
Download PDF version.