Unit rationale, description and aim

In today’s interconnected world, existing and emerging threats to privacy and security are of ever-growing concern and are no longer only concerns for IT professionals. Every individual, from students and employees to business owners, is at risk of a continuous stream of cyber threats. These threats, which encompass phishing scams, malware infections, data breaches, identity theft, and other forms of cyberattacks, can lead to significant personal and financial consequences for both individuals and businesses. Therefore, understanding the nature of security threats and being knowledgeable about the techniques and tools to counteract these threats is an essential skill for everyone.

This unit provides students with a foundational understanding of security concepts and the landscape of cybersecurity threats. It offers an introduction to strategies and tools that can help avoid common cyber threats, such as phishing emails, malware infections, and data breaches. Students will also explore the ethical and legal dimensions of cybersecurity, including issues surrounding data privacy and intellectual property rights.

The primary aim of this unit is to highlight the critical importance of cybersecurity awareness and to equip students with the knowledge and skills necessary to protect themselves and their information in the digital landscape.

2026 10

Campus offering

No unit offerings are currently available for this unit.

Prerequisites

Nil

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Apply the knowledge on security and cybersecurity ...

Learning Outcome 01

Apply the knowledge on security and cybersecurity concepts including ethical and legal dimensions of cybersecurity and their importance
Relevant Graduate Capabilities: GC1, GC10

Identify cyber threats and the consequences of cyb...

Learning Outcome 02

Identify cyber threats and the consequences of cybersecurity failures, including the financial, emotional, and reputational impacts on individuals and organisations
Relevant Graduate Capabilities: GC2, GC6

Apply the skills required to manage cyber threats

Learning Outcome 03

Apply the skills required to manage cyber threats
Relevant Graduate Capabilities: GC2, GC10

Examine cybersecurity solutions and technologies u...

Learning Outcome 04

Examine cybersecurity solutions and technologies used in different industries
Relevant Graduate Capabilities: GC2, GC8

Content

Topics will include:

 ·       Security and cybersecurity concepts and foundations

·       The importance of cybersecurity

·       Cyber vulnerabilities, threats, and attacks

·       Consequences of cybersecurity failures

·       The ethical and legal dimensions of cybersecurity

·       Knowledge and skills required for managing cyber threats

·       Innovative cybersecurity solutions and technologies to prevent cyber threats

Assessment strategy and rationale

The assessment strategy is designed to progressively develop students’ knowledge and skills in cybersecurity, ensuring alignment with learning outcomes. To pass this unit, students must achieve an aggregate mark of at least 50% across all assessments.

The first assessment is a reflective report, which will provide an opportunity for students to apply their cybersecurity knowledge in a practical context, demonstrating their understanding of cybersecurity threats and the implications of inadequate security practices.

The second assessment is an analytical report, requiring students to overview cyber threats and the consequences of cybersecurity failures, and demonstrate the solution they have implemented using the available AI tools for the assessment.

The final assessment is a real-world case study analysis, requiring students to apply cybersecurity principles and critically evaluate innovative solutions within an industry context. This task reinforces their understanding of cyber threats, management strategies, and emerging technologies while developing their ability to propose actionable recommendations.

All assessments are marked using rubrics aligned with learning outcomes. Students must demonstrate competency in cybersecurity concepts, application, and critical thinking to successfully complete the unit.

Overview of assessments

Assessment 1:  Reflective report Students ...

Assessment 1:  Reflective report

Students prepare a 800-word report analysing their daily online activities and the security measures on their devices. The report will involve reviewing and assessing their online behavior to identify potential weaknesses and threats. Students will then evaluate the risks associated with the security gaps and consider the potential consequences if such vulnerabilities were exploited. Additionally, the report will require students to identify the knowledge and skills needed to address these risks effectively. This assessment provides an opportunity for students to apply their cybersecurity knowledge in a practical context, demonstrating their understanding of cybersecurity threats and the implications of inadequate security practices.

Weighting

20%

Learning Outcomes LO1, LO2
Graduate Capabilities GC1, GC2, GC6, GC10

Assessment 2: Analytical report (1200 w...

Assessment 2: Analytical report (1200 words)

As part of this assessment task, students will overview cyber threats and the consequences of cybersecurity failures, including the financial, emotional, and reputational impacts on individuals and organisations. The student will pick an organisation to contextualie their consequences.

Students are required to submit the program demonstrating the solution they have implemented using the available AI tools for the assessment.

Weighting

35%

Learning Outcomes LO2, LO3
Graduate Capabilities GC2, GC6, GC10

Assessment 3: Case study (1600 words) Stude...

Assessment 3: Case study (1600 words)

Students will analyse a case study focused on a cybersecurity scenario and develop a risk mitigation plan. This task requires identifying security weaknesses, proposing solutions that integrate current security technologies, and considering ethical and legal implications. In a 1600-word report, students will present their findings and recommendations in a report, demonstrating their ability to translate cybersecurity knowledge into practical strategies.

Weighting

45%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC7, GC8, GC10

Learning and teaching strategy and rationale

Students should anticipate undertaking 150 hours of study for this unit over a twelve-week semester or equivalent study period, including class attendance, readings, online forum participation and assessment preparation.

This unit may be offered in “Attendance” and/or “Online” mode to cater for the learning needs and preferences of a range of participants.

Attendance Mode

Students will require face-to-face attendance in blocks of time determined by the school. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for students to prepare and revise.

Online Mode

This unit utilises an active learning approach whereby students will engage in e-module activities, readings and reflections, and opportunities to collaborate with peers in an online environment. This can involve, but is not limited to, online workshops, online discussion forums, chat rooms, guided reading, and webinars. Pre-recorded lectures will be incorporated within the online learning environment and e-modules. In addition, electronic readings will be provided to guide students’ reading and extend other aspects of online learning

Representative texts and references

Representative texts and references

Santos, O., Salam, S. and Dahir, H., 2024. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies.

Diogenes, Y., 2023. Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed. Addison-Wesley.

Stallings, W., 2018. Effective cybersecurity: a guide to using best practices and standards. Addison-Wesley Professional.

Stallings, W. and Brown, L., 2015. Computer security: principles and practice. Pearson.

Taylor, R.W., Fritsch, E.J., Liederbach, J., Saylor, M.R. and Tafoya, W.L., 2019. Cyber crime and cyber terrorism. New York, NY: Pearson.

Li, Y. and Liu, Q., 2021. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports7, pp.8176-8186.

Cyber Security - Introduction & Latest Cyber Security Threats <https://testbook.com/ias-preparation/cyber-security >

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs