Unit rationale, description and aim

With the increasing reliance on technology, it is becoming more and more essential to secure every aspect of online information and data. Therefore, network security is very critical for any organisation and is essential to protecting client data. This unit covers the advanced network security concepts that require to developing students’ knowledge and practical skills in digital communication and security.

This advanced unit explores the theoretical foundations and current landscape of cryptography, covering essential concepts required to understand complex security challenges in networked environments. The unit contents include networking concepts, classical cipher design and analysis, key management, digital signatures and hash algorithms, wireless security, web security, email security and data stewardship. The unit also focuses on applications of network security tools to prevent or detect security attacks. The aim of this unit is to provide students with a good understanding of network security issues and the importance of data stewardship, as well as the knowledge and skills they need to plan, design or implement in order to secure a networked environment.

2026 10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 2Campus Attendance

Prerequisites

ITEC204 Introduction to Cyber Security OR ITEC326 Information Systems Security

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Articulate knowledge of security services, securit...

Learning Outcome 01

Articulate knowledge of security services, security attacks, vulnerabilities, and potential threats to networks and systems
Relevant Graduate Capabilities: GC1, GC10

Apply knowledge and skills to select appropriate c...

Learning Outcome 02

Apply knowledge and skills to select appropriate cryptographic tools that provide required security services while promoting the common good through responsible data stewardship.
Relevant Graduate Capabilities: GC1, GC6

Utilise different network security tools and appli...

Learning Outcome 03

Utilise different network security tools and applications to analyse security strength of existing control measures
Relevant Graduate Capabilities: GC2, GC10

Design and integrate numerous security mechanisms ...

Learning Outcome 04

Design and integrate numerous security mechanisms for an organisation to mitigate vulnerabilities and threats
Relevant Graduate Capabilities: GC2, GC8

Content

Topics will include:

  • Introduction to network security
  • Unix programming
  • Programming in Shell Script
  • Key management
  • Data stewardship
  • Advanced cryptography
  • Authentication and password
  • Access control
  • Firewall and IDS
  • Email security
  • Wireless network security
  • Security tools

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment item consists of a number of weekly practical tasks which will give students the opportunity to implement their theoretical knowledge to solve problems in a practical environment. The second assessment item is a design report, where students will write a report on a given case study. The purpose of this assessment is to assess the students’ ability to apply their theoretical knowledge and design an effective solution to countermeasure security threats through collaborative learning. The final assessment is an open book exam, where students will study several case studies, critically analyse them and answer a number of open-ended questions. The purpose of this assessment is to test students’ ability to apply professional skills and practices in solving numerous problems.

The assessments for this unit are designed to demonstrate the achievement of each learning outcome. To pass this unit, students are required to: obtain an overall mark of at least 50%.


Overview of assessments

Assessment Task 1: Practical Assessments This a...

Assessment Task 1:

Practical Assessments

This assessment consists of a series of weekly lab exercises where students are required to apply different network security tools and techniques to solve practical problems.

The feedback from this assessment will help students to understand critical concepts of network security and their applications.


Submission Type: Individual

Assessment Method: Practical task

Artefact: Source Code/ Code Documentation

Weighting

20%

Learning Outcomes LO1, LO3
Graduate Capabilities GC1, GC2, GC10

Assessment Task 2: Reflective report on a case st...

Assessment Task 2: Reflective report on a case study

For this assessment tasks, students need to actively participate in online discussion forum to understand complex concepts through collaboration and self-reflection. They also required to write a 2500-word report reflecting their critical analysis on a contemporary issue of network security and its impact on the common good.

The purpose of this assessment is to assess the students’ critical and analytical ability to delve into complex concepts of network security.

Submission Type: Group

Assessment Method: Scientific report

Artefact: Written report + Online Viva

Weighting

30%

Learning Outcomes LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC6, GC10

Assessment Task 3: Exam This assessment task tes...

Assessment Task 3: Exam

This assessment task tests the students’ grasp of both theoretical and practical aspects of the unit. The students will study several case studies, critically analyse them and answer a number of open-ended questions. They also have to use network security tools to investigate the given scenarios and justify the outcomes.   

Submission Type: Individual

Assessment Method: Respondus Secure Exam

Artefact: Respondus Secure Exam

Weighting

50%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC8, GC10

Learning and teaching strategy and rationale

This unit is delivered through Attendance and Online modes using a single, integrated learning and teaching strategy designed to ensure equivalent learning outcomes and a comparable learning experience for all students, while supporting diverse learning needs and maximising access.

Across both modes, learning activities are intentionally aligned to the unit learning outcomes and assessment tasks, and are underpinned by active learning, guided engagement with disciplinary knowledge, opportunities for peer interaction, and regular, timely feedback. While the mode of delivery shapes how students participate, the pedagogical intent, expectations and standards remain consistent.

In Attendance mode, students engage in weekly face-to-face classes at designated locations, supported by preparatory activities prior to workshops and opportunities for consolidation following classes. Online learning platforms are used to complement face-to-face teaching through additional resources and learning activities.

In Online mode, students engage with the same core content and learning outcomes through a combination of synchronous and asynchronous activities, including structured discussions and applied learning tasks that support learning in professional contexts.

Across both delivery modes, students should plan to commit approximately 150 hours to this unit over the semester, including participation in learning activities, independent study, readings and assessment preparation.

Representative texts and references

Representative texts and references

Stallings, W. (2020). Cryptography and network security: Principles and practice (8th ed.). Pearson Education.

Stallings, W., & Brown, L. (2023). Computer security: Principles and practice (5th ed.). Pearson Education.

Pfleeger, C., Pfleeger, S. L., & Coles-Kemp, L. (2023). Security in computing (6th ed.). Pearson Education.

Anderson, R. (2020). Security engineering: A guide to building dependable distributed systems (3rd ed.). Wiley.

Whitman, M. E., & Mattord, H. J. (2021). Principles of information security (7th ed.). Cengage Learning.

Easttom, W. (2023). Network defense and countermeasures: Principles and practices (4th ed.). Pearson Education.

Stamp, M. (2021). Information security: Principles and practice (3rd ed.). Wiley.

Jukic, N., Vrbsky, S. V., & Nestorov, B. (2021). Database systems: Introduction to databases and data warehouses (2nd ed.). Prospect Press.

Vacca, J. R. (2022). Computer and information security handbook (4th ed.). Academic Press.

Ross, S. J. (2022). Cybersecurity and privacy in the digital age: A practical guide to understanding threats 

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs