Course Coordinator:Georg Lippold (glippold@usc.edu.au) School:School of Science, Technology and Engineering
UniSC Moreton Bay |
Blended learning | Most of your course is on campus but you may be able to do some components of this course online. |
Online |
Online | You can do this course without coming onto campus. |
Please go to usc.edu.au for up to date information on the
teaching sessions and campuses where this course is usually offered.
Cyber security specialist will use a complex array of tools, methods and applications to investigate and protect information in computer systems. You will be introduced to cryptography techniques that allow different parties to securely transmit information. You will explore blockchain and its growing uses, including cryptocurrencies. You will learn the differences between authentication and security protocols and how private keys are exchanged to establish secure communications
Activity | Hours | Beginning Week | Frequency |
Blended learning | |||
Learning materials – Asynchronous learning material | 2hrs | Week 1 | 13 times |
Tutorial/Workshop 1 – On campus workshop | 2hrs | Week 1 | 13 times |
Online | |||
Learning materials – Asynchronous learning material | 2hrs | Week 1 | 13 times |
Tutorial/Workshop 1 – Online workshop | 2hrs | Week 1 | 13 times |
300 Level (Graduate)
12 units
Course Learning Outcomes On successful completion of this course, you should be able to... | Graduate Qualities Completing these tasks successfully will contribute to you becoming... | |
1 | Demonstrate knowledge of cryptography fundamentals for security and authentication. | Knowledgeable |
2 | Compare and contrast data security and privacy of cryptographic protocols outlining their strengths and vulnerabilities. | Creative and critical thinker |
3 | Demonstrate the qualities of professionalism, leadership and digital collaboration. | Engaged |
4 | Communicate research and findings to specialist and non-specialist audiences. | Engaged |
Refer to the UniSC Glossary of terms for definitions of “pre-requisites, co-requisites and anti-requisites”.
SEC301
Not applicable
Not applicable
Not applicable
Standard Grading (GRD)
High Distinction (HD), Distinction (DN), Credit (CR), Pass (PS), Fail (FL). |
On-going formative feedback will be provided in workshops throughout the course.
Delivery mode | Task No. | Assessment Product | Individual or Group | Weighting % | What is the duration / length? | When should I submit? | Where should I submit it? |
All | 1 | Artefact - Technical and Scientific, and Written Piece | Individual | 30% | 2,000 words |
Week 5 | Online Assignment Submission with plagiarism check |
All | 2 | Case Study | Group | 30% | Written report, maximum of 2,000 words in length. |
Week 9 | Online Assignment Submission with plagiarism check |
All | 3 | Portfolio | Individual | 40% | Work is performed over the course of the 13 weeks |
Exam Period | Online Assignment Submission with plagiarism check |
All - Assessment Task 1:Network Encryption Protocols | |
Goal: | This written piece will evaluate the network encryption protocols implemented by a notional company that has been the victim of a data breach. The written piece will provide corporate leadership an assessment of their security status and make specific recommendations to their current business practices and processes. |
Product: | Artefact - Technical and Scientific, and Written Piece |
Format: | Students will prepare a written report of no more than 2,000 words using APA7 style, and then present their concept through an oral presentation. The artefact will be written in plain English and provide suitable information that a non technical person may understand. |
Criteria: |
|
All - Assessment Task 2:Digital group cryptology challenge | |
Goal: | This is a cryptology challenge task where you will work with a team to decipher and work through a complex case study. The intent is to examine a case wherein subjects are accused of illicitly removing encrypted information from their workspace and identify the methods and procedures in place that impacted the case. |
Product: | Case Study |
Format: | You will prepare a written report as a group identifying the methods by which individuals circumvented security controls to illicitly remove classified information. You will compare and contrast the security features in place and discuss their roles in the securing and protection of protected data. The report will have an annex that outlines the work of the team members, specific elements/roles performed by the members and an indication of the division of work. |
Criteria: |
|
All - Assessment Task 3:Practical Proof of Work Portfolio | |
Goal: | The goal of this portfolio is to prove knowledge and understanding of cryptographic concepts such as digital wallet creation, revealing steganographic content, creating and decrypting messages |
Product: | Portfolio |
Format: | Individual proofs of work are emailed to the instructor during each week they are created |
Criteria: |
|
A 12-unit course will have total of 150 learning hours which will include directed study hours (including online if required), self-directed learning and completion of assessable tasks. Student workload is calculated at 12.5 learning hours per one unit.
Please note: Course information, including specific information of recommended readings, learning activities, resources, weekly readings, etc. are available on the course Canvas site– Please log in as soon as possible.
Please note that you need to have regular access to the resource(s) listed below. Resources may be required or recommended.
Required? | Author | Year | Title | Edition | Publisher |
Required | David Kahn | 1996 | The Codebreakers | n/a | Simon and Schuster |
Required | Daniel Drescher | 2017 | Blockchain Basics | 1st | Apress |
This course requires access to computers and specialised software that are not available ay UniSC. Students should have systems administrative level access to be able to install a variety of software applications. If you elect to do this course online, you may either; attend a campus at which it is available, discuss alternative solutions with your course coordinator that would enable you to demonstrate the learning outcomes, or if you prefer you may acquire this software (if necessary at your own expense). Some software providers may offer discounted or free academic licensing.
Academic integrity is the ethical standard of university participation. It ensures that students graduate as a result of proving they are competent in their discipline. This is integral in maintaining the value of academic qualifications. Each industry has expectations and standards of the skills and knowledge within that discipline and these are reflected in assessment.
Academic integrity means that you do not engage in any activity that is considered to be academic fraud; including plagiarism, collusion or outsourcing any part of any assessment item to any other person. You are expected to be honest and ethical by completing all work yourself and indicating in your work which ideas and information were developed by you and which were taken from others. You cannot provide your assessment work to others. You are also expected to provide evidence of wide and critical reading, usually by using appropriate academic references.
In order to minimise incidents of academic fraud, this course may require that some of its assessment tasks, when submitted to Canvas, are electronically checked through Turnitin. This software allows for text comparisons to be made between your submitted assessment item and all other work to which Turnitin has access.
Eligibility for Supplementary Assessment Your eligibility for supplementary assessment in a course is dependent of the following conditions applying: The final mark is in the percentage range 47% to 49.4% The course is graded using the Standard Grading scale You have not failed an assessment task in the course due to academic misconduct
Late submission of assessment tasks may be penalised at the following maximum rate: - 5% (of the assessment task's identified value) per day for the first two days from the date identified as the due date for the assessment task. - 10% (of the assessment task's identified value) for the third day - 20% (of the assessment task's identified value) for the fourth day and subsequent days up to and including seven days from the date identified as the due date for the assessment task. - A result of zero is awarded for an assessment task submitted after seven days from the date identified as the due date for the assessment task. Weekdays and weekends are included in the calculation of days late. To request an extension you must contact your course coordinator to negotiate an outcome.
UniSC is committed to a culture of respect and providing a safe and supportive environment for all members of our community. For immediate assistance on campus contact SafeUniSC by phone: 07 5430 1168 or using the SafeZone app. For general enquires contact the SafeUniSC team by phone 07 5456 3864 or email safe@usc.edu.au.
The SafeUniSC Specialist Service is a Student Wellbeing service that provides free and confidential support to students who may have experienced or observed behaviour that could cause fear, offence or trauma. To contact the service call 07 5430 1226 or email studentwellbeing@usc.edu.au.
For help with course-specific advice, for example what information to include in your assessment, you should first contact your tutor, then your course coordinator, if needed.
If you require additional assistance, the Learning Advisers are trained professionals who are ready to help you develop a wide range of academic skills. Visit the Learning Advisers web page for more information, or contact Student Central for further assistance: +61 7 5430 2890 or studentcentral@usc.edu.au.
Student Wellbeing provide free and confidential counselling on a wide range of personal, academic, social and psychological matters, to foster positive mental health and wellbeing for your academic success.
To book a confidential appointment go to Student Hub, email studentwellbeing@usc.edu.au or call 07 5430 1226.
Ability Advisers ensure equal access to all aspects of university life. If your studies are affected by a disability, learning disorder mental health issue, injury or illness, or you are a primary carer for someone with a disability or who is considered frail and aged, AccessAbility Services can provide access to appropriate reasonable adjustments and practical advice about the support and facilities available to you throughout the University.
To book a confidential appointment go to Student Hub, email AccessAbility@usc.edu.au or call 07 5430 2890.
For more information on Academic Learning & Teaching categories including:
For more information, visit https://www.usc.edu.au/explore/policies-and-procedures#academic-learning-and-teaching
UniSC is committed to excellence in teaching, research and engagement in an environment that is inclusive, inspiring, safe and respectful. The Student Charter sets out what students can expect from the University, and what in turn is expected of students, to achieve these outcomes.