Unit rationale, description and aim

Cyber security is the practice of protecting networks, computer systems, and data from malicious attacks. With the increasing threats of data breach and leaks in our interconnected world, flntech companies, hospitals, government agencies, and every other sector are investing in cybersecurity infrastructure to protect their data and consumers from malicious attacks. However, there is a global shortage of cyber security experts and this number is growing every year. This unit is designed to help students develop a deeper understanding of modern information and cyber security challenges, mitigation techniques and tools.

The unit demonstrates the basic cyber security concepts, security tools and the common architectures used as industry standards. Students will learn how to defend against cyber threats and attacks and study existing techniques for managing security issues and maintaining the working environment.

The unit also covers ethical and legal issues in cyberspace to understand how cyber security affects legal compliance and solidarity in communities and society. The aim of this unit is to equip students with some background knowledge in cyber security, which scaffolds an advanced unit in network security.

2026 10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 1Campus Attendance

Prerequisites

Nil

Incompatible

ITEC326 Information Systems Security

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Explain key cybersecurity concepts and essential d...

Learning Outcome 01

Explain key cybersecurity concepts and essential digital safety practices to develop a foundational understanding of secure online behaviour.
Relevant Graduate Capabilities: GC1, GC10

Identify common cyber threats and appropriate prev...

Learning Outcome 02

Identify common cyber threats and appropriate preventative measures by referring to real-life digital security incidents.
Relevant Graduate Capabilities: GC2, GC8

Apply knowledge of cybersecurity frameworks to exp...

Learning Outcome 03

Apply knowledge of cybersecurity frameworks to explore different job roles and possible career paths in the cybersecurity industry.
Relevant Graduate Capabilities: GC2, GC7

Analyse ethical and legal considerations in digita...

Learning Outcome 04

Analyse ethical and legal considerations in digital environments and their implications for individuals, organisations, and society.
Relevant Graduate Capabilities: GC2, GC6

Content

Topics will include:

· Introduction to Cybersecurity & Digital Citizenship

· Cyber Hygiene & Best Practices

· Cyber Threats in Everyday Life

· Cybersecurity and Mobile, IoT, and Social Media

· Cybercrime and Reporting Mechanisms

· Cybersecurity Careers and Roles

· Cybersecurity Frameworks & Compliance (Non-technical)

· Cyber Ethics and AI

· Encryption & Data Protection (Introductory)

· Case Studies of Major Cyber Incidents

· Gamified Cybersecurity & Simulation Tools

· Final Project Brief & Wrap-Up

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with university assessment requirements.

The first assessment item is an individual reflection task focused on cyber hygiene. Students will complete a cyber hygiene checklist and submit a written report critically reflecting on their personal cybersecurity practices. The purpose of this task is to enhance students’ self-awareness and understanding of foundational cybersecurity concepts as applied in daily digital interactions. The second assessment item is a group case study analysis report, where students will examine a major real-world cybersecurity incident. Students will collaboratively evaluate the technical, ethical, and social implications of the event and produce a comprehensive written report. This assessment aims to build students’ research and analytical capabilities, as well as foster teamwork and communication skills. The final assessment is a project comprising both completed laboratory tasks and a project report. The laboratory tasks develop and evidence the practical skills required for the project and directly inform the project focus and design. The purpose of this assessment is to test students’ ability to apply their knowledge and skills in solving problems.

 The assessments for this unit are designed to demonstrate the achievement of each learning outcome. To pass this unit, you are required to obtain an overall mark of at least 50%.

Overview of assessments

Task 1: Cyber Hygiene Reflection Task In this in...

Task 1: Cyber Hygiene Reflection Task

In this individual assessment, students will complete a cyber hygiene checklist and reflect critically on their personal cybersecurity practices. The task encourages self-awareness and the application of foundational cybersecurity concepts in everyday digital behaviour.

 Submission Type: Individual

Assessment Method: Report

Artefact: Written report (800 words)

 

Weighting

25%

Learning Outcomes LO1, LO2
Graduate Capabilities GC1, GC2, GC8, GC10

Task 2: Case Study Analysis Report This group ta...

Task 2: Case Study Analysis Report

This group task involves analysing a major real-world cybersecurity incident. Students will evaluate the technical, ethical, and social implications of the incident, working collaboratively to produce a comprehensive written report. Students will use GenAI tools to critically analyse the case study and will critically evaluate and reflect on the GenAI generated report content. Individuals contributions must be clearly documented and will be assessed to ensure accountability. This assessment fosters teamwork, research, and analytical skills.


Submission Type: Group

Assessment Method:

Group live/recorded speaker view webcam overlay (5-8 minutes) + Online Viva

Weighting

35%

Learning Outcomes LO2, LO3
Graduate Capabilities GC2, GC7, GC8

Task 3: Final Project Report Students will engag...

Task 3: Final Project Report

Students will engage with peers through the discussion forum and complete a series of laboratory tasks that collectively support the development of a cybersecurity awareness campaign or response scenario. This task assesses students' ability to communicate cybersecurity knowledge effectively to a wider audience and demonstrate their understanding of core concepts through creative or practical application.

 Submission Type: Individual

Assessment Method: Report (1700 words) + Online Viva

Weighting

40%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC2, GC6, GC7, GC8, GC10

Learning and teaching strategy and rationale

This unit is delivered through Attendance and Online modes using a single, integrated learning and teaching strategy designed to ensure equivalent learning outcomes and a comparable learning experience for all students, while supporting diverse learning needs and maximising access.

Across both modes, learning activities are intentionally aligned to the unit learning outcomes and assessment tasks, and are underpinned by active learning, guided engagement with disciplinary knowledge, opportunities for peer interaction, and regular, timely feedback. While the mode of delivery shapes how students participate, the pedagogical intent, expectations and standards remain consistent.

In Attendance mode, students engage in weekly face-to-face classes at designated locations, supported by preparatory activities prior to workshops and opportunities for consolidation following classes. Online learning platforms are used to complement face-to-face teaching through additional resources and learning activities.

In Online mode, students engage with the same core content and learning outcomes through a combination of synchronous and asynchronous activities, including structured discussions and applied learning tasks that support learning in professional contexts.

Across both delivery modes, students should plan to commit approximately 150 hours to this unit over the semester, including participation in learning activities, independent study, readings and assessment preparation.

Representative texts and references

Representative texts and references

Stallings, W., & Brown, L. (2024). Computer security: Principles and practices (5th Global ed.). Pearson US.

Stallings, W. (2020). Cryptography & network security: Principles and practices (8th ed.). Pearson US.

Brooks, C. J., Craig, P., & Short, D. (2018). Cybersecurity essentials. SYBEX.

Anderson, R. (2020). Security engineering: A guide to building dependable distributed systems (3rd ed.). Wiley.

Steinberg, J. (2019). Cybersecurity for Dummies. Wiley.

Brooks, C. J., Grow, C., Craig, P., & Short, D. (2018). Cybersecurity Essentials. Wiley.

Meeuwisse, R. (2017). Cybersecurity for Beginners. Cyber Simplicity Ltd.

Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.

NIST Cybersecurity Framework – https://www.nist.gov/cyberframework

TryHackMe & CyberStart – Gamified cybersecurity training tools

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs