Unit rationale, description and aim

As digital infrastructures become increasingly integral to business, government, and everyday life, the frequency and sophistication of cyber threats continue to rise. Professionals with the ability to understand, anticipate, and defend against these threats are in high demand across all sectors. Engaging with network and information security equips students with the expertise needed to protect critical systems, ensure data integrity, and uphold public trust in digital technologies.

This unit offers a critical awareness of current developments, industry practices, and future trends in network security, web security, database security, and wireless security. Students will explore a range of tools and techniques used to combat threats such as malware, intrusions, social engineering, data leakage, and zero-day attacks. These topics are examined through the lens of secure authentication mechanisms, password management, intrusion detection and prevention systems, information security policies, and user education. A hands-on component requires students to design a shell-script-based intrusion detection system (IDS), providing practical skills in identifying and responding to threats within a host system.

The aim of this unit is to provide students with a comprehensive understanding of network and information security issues, and to develop the knowledge and skills required to identify security threats and design appropriate countermeasures to protect systems and data.

2026 10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 2Campus Attendance
  • Term Mode
  • ACU Term 2Online Unscheduled
  • ACU Term 4Online Unscheduled

Prerequisites

Nil

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Synthesise knowledge on security goals, threats, v...

Learning Outcome 01

Synthesise knowledge on security goals, threats, vulnerabilities, and potential security attacks in a networked environment
Relevant Graduate Capabilities: GC1, GC9

Apply knowledge and skills in selecting appropriat...

Learning Outcome 02

Apply knowledge and skills in selecting appropriate cryptographic tools to provide the required security services and ensure common good through data stewardship
Relevant Graduate Capabilities: GC2, GC6

Design a host-based intrusion detection system (ID...

Learning Outcome 03

Design a host-based intrusion detection system (IDS) using shell script to detect malicious attacks on a system
Relevant Graduate Capabilities: GC2, GC10

Comprehensively analyse and evaluate complex netwo...

Learning Outcome 04

Comprehensively analyse and evaluate complex network systems, discover, and mitigate vulnerabilities and threats
Relevant Graduate Capabilities: GC2, GC8

Content

Topics will include:

  • Introduction to network security
  • Unix programming
  • Shell scripting
  • Data stewardship
  • Key management
  • Authentication and Password Management
  • Firewall and IDS
  • Email & Database security
  • Wireless network security
  • Web Security
  • Security tools

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment provides students with an opportunity to gain practical/hands-on skills. The second assessment task is designed to provide students an opportunity to apply their theoretical knowledge and skills and design a practical security solution. The last assessment provides students with an opportunity to test their grasp of theoretical and practical aspects of the unit.

To pass this unit, students must demonstrate competence in all learning outcomes and achieve an aggregate mark of at least 50%. Marking will be in accordance with a rubric specifically developed to measure students’ level of achievement of the learning outcomes for each item of assessment. Students will be awarded a final grade that signifies their overall achievement in the unit.

Overview of assessments

Assessment Task 1: Practical Assessment This ass...

Assessment Task 1: Practical Assessment

This assessment consists of hands on exercises where students are required to apply different network security tools and techniques to solve practical problems. The feedback from this assessment will help students to understand critical concepts of network security and their applications. 

Submission Type: Individual

Assessment Method: Practical task

Artefact: Source Code/report

Weighting

20%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC8, GC10

Assessment Task 2: Designing an Intrusion Detecti...

Assessment Task 2: Designing an Intrusion Detection System using Shell Script

This assessment task consists of Shell Code and a report. This task requires students to develop professional skills through the application of theoretical knowledge and understanding of Unix programming concepts. The students are expected to develop an Intrusion Detection System (IDS) in Shell script to detect anomalies.

The purpose of this assessment is to assess the students’ ability to apply their theoretical knowledge and design an effective solution to countermeasure security threats through collaborative learning.

Submission Type: Group

Assessment Method: Implementation & Test report

Artefact: Shell Code and Report (1500 words) + Online Viva

Weighting

30%

Learning Outcomes LO1, LO2, LO3
Graduate Capabilities GC2, GC8, GC10

Assessment Task 3: Problem Solving This assessme...

Assessment Task 3: Problem Solving

This assessment task tests the students’ grasp of both theoretical and practical aspects of the unit. The students will study several case studies, critically analyse them and answer a number of open-ended questions. They also have to use network security tools to investigate the given scenarios and justify the outcomes.   

Students explore the potential of using AI tools for network security applications.

Submission Type: Individual

Assessment Method: Case Study + Practical + Presentation

Artefact:

Program files/code + Live / Recorded with face-overlay Presentation (8 minutes) + Online Viva

Weighting

50%

Learning Outcomes LO1, LO2, LO4
Graduate Capabilities GC1, GC2, GC6, GC8, GC10

Learning and teaching strategy and rationale

This unit is delivered through Attendance and Online modes using a single, integrated learning and teaching strategy designed to ensure equivalent learning outcomes and a comparable learning experience for all students, while supporting diverse learning needs and maximising access.

Across both modes, learning activities are intentionally aligned to the unit learning outcomes and assessment tasks, and are underpinned by active learning, guided engagement with disciplinary knowledge, opportunities for peer interaction, and regular, timely feedback. While the mode of delivery shapes how students participate, the pedagogical intent, expectations and standards remain consistent.

In Attendance mode, students engage in weekly face-to-face classes at designated locations, supported by preparatory activities prior to workshops and opportunities for consolidation following classes. Online learning platforms are used to complement face-to-face teaching through additional resources and learning activities.

In Online mode, students engage with the same core content and learning outcomes through a combination of synchronous and asynchronous activities, including structured discussions and applied learning tasks that support learning in professional contexts.

Representative texts and references

Representative texts and references

Stallings W 2022, Cryptography & Network Security: Principles and Practice, Global Edition, 8th edn, Pearson

Pfleeger C & Pfleeger S & Margulies J 2023, Security in Computing, 6th edn, Addison-Wesley Professional.

Stallings W & Brown L, 2018, Computer Security: Principle and Practice, 4th Edn, Pearson US.

Anderson, R 2020, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd edn, Wiley.

Whitman, M & Mattord, H 2021, Principles of Information Security, 7th edn, Cengage, Boston. 

Stallings, W., & Brown, L. (2023). Computer security: Principles and practice (5th ed., Global ed.). Pearson Education.

Kaufman, C., Perlman, R., Speciner, M., & Perlner, R. (2022). Network security: Private communication in a public world (3rd ed.). Addison-Wesley Professional / Pearson.

Easttom, W. C. (2023). Computer security fundamentals (5th ed.). Pearson IT Certification / Pearson Education.

Paar, C., Pelzl, J., & Güneysu, T. (2024). Understanding cryptography: From established symmetric and asymmetric ciphers to post-quantum algorithms (2nd ed.). Springer Nature.

Stamp, M. (2021). Information security: Principles and practice (3rd ed.). Wiley.

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs