× You are viewing an archive version of this unit.

Hobart, Launceston


This unit gives an introduction to the risks and threats to computer systems and some of the countermeasures that can be put in place to minimise them. Students will develop an understanding of the ethical and privacy issues relating to the security of computer systems and the professional code of conduct. This unit is also an introduction to ethical hacking which is attempting to penetrate secure systems in order to demonstrate vulnerability so that steps can be taken to mitigate risk. Students will develop an understanding of some of the techniques that can be employed to evaluate the security of, and defend against threats to, computer systems and networks through physical and electronic means.

Summary 2021

Unit name CyberSecurity and Ethical Hacking
Unit code KIT215
Credit points 12.5
Faculty/School College of Sciences and Engineering
School of Information and Communication Technology
Discipline Information & Communication Technology

Tony Gray

Available as student elective? No
Breadth Unit? No



Please check that your computer meets the minimum System Requirements if you are attending via Distance/Off-Campus.

Units are offered in attending mode unless otherwise indicated (that is attendance is required at the campus identified). A unit identified as offered by distance, that is there is no requirement for attendance, is identified with a nominal enrolment campus. A unit offered to both attending students and by distance from the same campus is identified as having both modes of study.

Special approval is required for enrolment into TNE Program units.

TNE Program units special approval requirements.

* The Final WW Date is the final date from which you can withdraw from the unit without academic penalty, however you will still incur a financial liability (see withdrawal dates explained for more information).

About Census Dates

Learning Outcomes


explain ethical and privacy issues as they related to cybersecurity, hacking and the law.


evaluate cyber threats and risks to computer systems.


penetrate specifically approved systems using ethical hacking techniques.


apply appropriate countermeasures to defend against cyber security threats.


describe the role and function of cryptographic algorithms and protocols in meet their security goal.





Mutual Exclusions

You cannot enrol in this unit as well as the following:



Teaching Pattern

120 minute lecture weekly, 120 minute tutorial weekly


AT1 - Report (20%)

AT2 - Practical Test 1 (15%)

AT3 - Practical Test 2 (15%)

AT4 - 2-hour Exam (50%)

TimetableView the lecture timetable | View the full unit timetable



The University reserves the right to amend or remove courses and unit availabilities, as appropriate.