Hobart, Launceston, Cradle Coast
This unit familiarises you with cyber security penetration testing and mitigation strategies for business. The unit starts by examining penetration testing tools as defined by the Open Web Application Security Project (OWASP). The unit then examines common threats and vulnerabilities, and how penetration testing tools and techniques encapsulated within Kali Linux can enumerate these. Along the way the unit also examines the mitigation strategies, operational controls and countermeasures needed to address the threats and vulnerabilities. You will apply this learning in practice by working in a group to complete a cyber security consultancy for an industry partner. By the end of the unit, you will be better prepared to apply cyber security knowledge to support and make improvements for business.
|Unit name||Concepts and Procedures for Cyber Security|
Dr Luke Mirowski
|Available as student elective?||No|
|Location||Study period||Attendance options||Available to|
|Launceston||Term 4||On-Campus||Off-Campus||Domestic Domestic|
|Cradle Coast||Term 4||On-Campus||Domestic|
- International students
- Domestic students
Please check that your computer meets the minimum System Requirements if you are attending via Distance/Off-Campus.
Units are offered in attending mode unless otherwise indicated (that is attendance is required at the campus identified). A unit identified as offered by distance, that is there is no requirement for attendance, is identified with a nominal enrolment campus. A unit offered to both attending students and by distance from the same campus is identified as having both modes of study.
Special approval is required for enrolment into TNE Program units.
|Study Period||Start date||Census date||WW date||End date|
* The Final WW Date is the final date from which you can withdraw from the unit without academic penalty, however you will still incur a financial liability (see withdrawal dates explained for more information).
Unit census dates currently displaying for 2020 are indicative and subject to change. Finalised census dates for 2020 will be available from the 1st October 2019.
- Uses cyber security penetration testing tools and techniques to identify and characterise threats and vulnerabilities for business.
- Applies cyber security tools, techniques and methodologies to design and implement mitigation strategies and countermeasures.
- Evaluates and reflects on the effectiveness of penetration testing, mitigation strategies and countermeasures to facilitate continuous improvement outcomes
- Apply discipline based skills and knowledge in dynamic practice situations
- Analyse and communicate core concepts related to discipline knowledge and practice
- Analyse and evaluate applications of innovative and/or entrepreneurial practice
- Develop and communicate understandings related to graduate attributes and transferable skills as adaptive practitioners
|Band||CSP Student Contribution||Field of Education|
Fees for next year will be published in October. The fees above only apply for the year shown.
Please note: international students should refer to this page to get an indicative course cost.
Teaching material and tutorial support will be provided weekly through MyLO during the term.
Students will be required to attend two to three on campus practical sessions per term (2-3 hours per session).
Internet access is required for this course as students are required to access study materials provided online through MyLO. Please log into MyLO on the first day of each teaching period.
AT1: Practical skills portfolio (30%)
AT2: Online quiz (30%)
AT3: Project Report (40%)
|Timetable||View the lecture timetable | View the full unit timetable|
Booktopia textbook links
The University reserves the right to amend or remove courses and unit availabilities, as appropriate.