Hobart, Launceston
Introduction
This unit gives an introduction to the risks and threats to computer systems and some of the countermeasures that can be put in place to minimise them. Students will develop an understanding of the ethical and privacy issues relating to the security of computer systems and the professional code of conduct. This unit is also an introduction to ethical hacking which is attempting to penetrate secure systems in order to demonstrate vulnerability so that steps can be taken to mitigate risk. Students will develop an understanding of some of the techniques that can be employed to evaluate the security of, and defend against threats to, computer systems and networks through physical and electronic means.
Summary 2021
Unit name | CyberSecurity and Ethical Hacking |
---|---|
Unit code | KIT215 |
Credit points | 12.5 |
Faculty/School | College of Sciences and Engineering School of Information and Communication Technology |
Discipline | Information & Communication Technology |
Coordinator | Tony Gray |
Available as student elective? | No |
Breadth Unit? | No |
Availability
Note
Please check that your computer meets the minimum System Requirements if you are attending via Distance/Off-Campus.
Units are offered in attending mode unless otherwise indicated (that is attendance is required at the campus identified). A unit identified as offered by distance, that is there is no requirement for attendance, is identified with a nominal enrolment campus. A unit offered to both attending students and by distance from the same campus is identified as having both modes of study.
Special approval is required for enrolment into TNE Program units.
TNE Program units special approval requirements.
* The Final WW Date is the final date from which you can withdraw from the unit without academic penalty, however you will still incur a financial liability (see withdrawal dates explained for more information).
Learning Outcomes
1 | explain ethical and privacy issues as they related to cybersecurity, hacking and the law. |
2 | evaluate cyber threats and risks to computer systems. |
3 | penetrate specifically approved systems using ethical hacking techniques. |
4 | apply appropriate countermeasures to defend against cyber security threats. |
5 | describe the role and function of cryptographic algorithms and protocols in meet their security goal. |
Fees
Requisites
Prerequisites
KIT111
Mutual Exclusions
You cannot enrol in this unit as well as the following:
KIT112
Teaching
Teaching Pattern | 120 minute lecture weekly, 120 minute tutorial weekly |
---|---|
Assessment | AT1 - Report (20%) AT2 - Practical Test 1 (15%) AT3 - Practical Test 2 (15%) AT4 - 2-hour Exam (50%) |
Timetable | View the lecture timetable | View the full unit timetable |
Textbooks
Required | None |
---|
The University reserves the right to amend or remove courses and unit availabilities, as appropriate.