This unit gives an introduction to the risks and threats to computer systems and some of the countermeasures that can be put in place to minimise them. Students will develop an understanding of the ethical and privacy issues relating to the security of computer systems and the professional code of conduct. This unit is also an introduction to ethical hacking which is attempting to penetrate secure systems in order to demonstrate vulnerability so that steps can be taken to mitigate risk. Students will develop an understanding of some of the techniques that can be employed to evaluate the security of, and defend against threats to, computer systems and networks through physical and electronic means.
|Unit name||CyberSecurity and Ethical Hacking|
|Faculty/School||College of Sciences and Engineering
School of Information and Communication Technology
|Discipline||Information & Communication Technology|
|Available as student elective?||No|
|Location||Study period||Attendance options||Available to|
- International students
- Domestic students
Please check that your computer meets the minimum System Requirements if you are attending via Distance/Off-Campus.
Units are offered in attending mode unless otherwise indicated (that is attendance is required at the campus identified). A unit identified as offered by distance, that is there is no requirement for attendance, is identified with a nominal enrolment campus. A unit offered to both attending students and by distance from the same campus is identified as having both modes of study.
Special approval is required for enrolment into TNE Program units.
|Study Period||Start date||Census date||WW date||End date|
* The Final WW Date is the final date from which you can withdraw from the unit without academic penalty, however you will still incur a financial liability (see withdrawal dates explained for more information).
explain ethical and privacy issues as they related to cybersecurity, hacking and the law.
evaluate cyber threats and risks to computer systems.
penetrate specifically approved systems using ethical hacking techniques.
apply appropriate countermeasures to defend against cyber security threats.
describe the role and function of cryptographic algorithms and protocols in meet their security goal.
|Field of Education||Commencing Student Contribution 1||Grandfathered Student Contribution 1||Approved Pathway Course Student Contribution 2||Domestic Full Fee|
1 Please refer here more information on student contribution amounts.
2 Information on eligibility and Approved Pathway courses can be found here
If you have any questions in relation to the fees, please contact UConnect or more information is available on StudyAssist.
Please note: international students should refer to this page to get an indicative course cost.
You cannot enrol in this unit as well as the following:
120 minute lecture weekly, 120 minute tutorial weekly
AT1 - Report (20%)
AT2 - Practical Test 1 (15%)
AT3 - Practical Test 2 (15%)
AT4 - 2-hour Exam (50%)
|Timetable||View the lecture timetable | View the full unit timetable|
|Links||Booktopia textbook finder|
The University reserves the right to amend or remove courses and unit availabilities, as appropriate.