Unit rationale, description and aim

Cyber security is the practice of protecting networks, computer systems, and data from malicious attacks. With the increasing threats of data breaches and leaks in our interconnected world, fintech companies, hospitals, government agencies, and every other sector are investing in cybersecurity infrastructure to protect their data and consumers from malicious attacks. However, there is a global shortage of cyber security experts, and this number is growing every year.

This unit introduces students to the foundational principles of cybersecurity in both personal and professional digital environments. It serves as a foundation for more advanced cybersecurity topics in later units, providing essential knowledge and skills that support further study in information security. The unit covers cybersecurity goals, digital safety, and practical security awareness, highlighting the increasing importance of secure online behaviour and privacy. Students will explore cybersecurity concepts such as cyber hygiene, cyber threats, frameworks, ethics, and legal responsibilities. Emphasis is placed on real-world applications of these concepts through case studies, practical tools, and collaborative activities. The unit is designed for both IT and non-IT students and aims to develop a baseline understanding of cybersecurity, enabling learners to apply safe practices and contribute to the digital safety of organisations and communities.

2026 10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 1Campus Attendance

Prerequisites

Nil

Incompatible

ITEC326 Information Systems Security

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Explain key cybersecurity concepts and essential d...

Learning Outcome 01

Explain key cybersecurity concepts and essential digital safety practices to develop a foundational understanding of secure online behaviour.
Relevant Graduate Capabilities: GC1, GC8

Identify common cyber threats and appropriate prev...

Learning Outcome 02

Identify common cyber threats and appropriate preventative measures by referring to real-life digital security incidents.
Relevant Graduate Capabilities: GC2, GC8

Apply knowledge of cybersecurity frameworks to exp...

Learning Outcome 03

Apply knowledge of cybersecurity frameworks to explore different job roles and possible career paths in the cybersecurity industry.
Relevant Graduate Capabilities: GC2, GC11

Analyse ethical and legal considerations in digita...

Learning Outcome 04

Analyse ethical and legal considerations in digital environments and their implications for individuals, organisations, and society.
Relevant Graduate Capabilities: GC2, GC7

Content

Topics will include:

·       Introduction to Cybersecurity & Digital Citizenship

·       Cyber Hygiene & Best Practices

·       Cyber Threats in Everyday Life

·       Cybersecurity and Mobile, IoT, and Social Media

·       Cybercrime and Reporting Mechanisms

·       Cybersecurity Careers and Roles

·       Cybersecurity Frameworks & Compliance (Non-technical)

·       Cyber Ethics and AI

·       Encryption & Data Protection (Introductory)

·       Case Studies of Major Cyber Incidents

·       Gamified Cybersecurity & Simulation Tools

·       Final Project Brief & Wrap-Up

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with university assessment requirements.

The first assessment item is an individual reflection on cyber hygiene. Students will complete a cyber hygiene checklist and submit a written report critically reflecting on their personal cyber security practices to build self-awareness and foundational knowledge. The second assessment is a group case study analysis of a real-world cybersecurity incident. Students will collaboratively evaluate the technical, ethical, and social implications of the event and submit a comprehensive report. Individual contributions must be documented and will be assessed to ensure accountability. The final assessment is an individual project report, in which students prepare a report on cyber security awareness campaign or a response scenario. This task assesses students’ ability to apply their knowledge in practical or creative ways and communicate cyber security concepts to a broader audience. Any use of AI tools must be appropriately acknowledged.

The assessments for this unit are designed to demonstrate the achievement of each learning outcome. To pass this unit, you are required to obtain an overall mark of at least 50%.

Overview of assessments

Task 1: Cyber Hygiene Reflection Task In this ind...

Task 1: Cyber Hygiene Reflection Task

In this individual assessment, students will complete a cyber hygiene checklist and reflect critically on their personal cybersecurity practices. The task encourages self-awareness and the application of foundational cybersecurity concepts in everyday digital behaviour.

 

Submission Type: Individual

Assessment Method: Report

Artefact: Written report (1000 words)

Weighting

25%

Learning Outcomes LO1
Graduate Capabilities GC1, GC8

Task 2: Case Study Analysis Report This group tas...

Task 2: Case Study Analysis Report

This group task involves analysing a major real-world cybersecurity incident. Students will evaluate the technical, ethical, and social implications of the incident, working collaboratively to produce a comprehensive written report. Individual contributions must be clearly documented and will be assessed to ensure accountability. This assessment fosters teamwork, research, and analytical skills.

 

Submission Type: Group

Assessment Method: Report

Artefact: Written report (2000 words)

Weighting

35%

Learning Outcomes LO2, LO3, LO4
Graduate Capabilities GC2, GC7, GC8, GC11

Task 3: Final Project Report Students will intera...

Task 3: Final Project Report

Students will interact with each other via discussion forum and develop a cybersecurity awareness project report or a response scenario. This task assesses students' ability to communicate cybersecurity knowledge effectively to a wider audience and demonstrate their understanding of core concepts through creative or practical application.

 

Submission Type: Individual

Assessment Method: Report

Artefact: Written report (1800 words)

Weighting

40%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC7, GC8, GC11

Learning and teaching strategy and rationale

This unit uses a collaborative and practice-based learning approach and will be delivered in multi-mode over a twelve-week semester or equivalent study period. Students will have access to all primary learning materials online, along with formative and summative assessments, to provide a learning experience beyond the classroom. While there are no formal classroom lectures for this unit, students will be required to attend weekly two-hour workshops, which will include a seminar and specific tasks related to the achievement of the unit learning outcomes.

Students should anticipate undertaking 150 hours of study for this unit, including class attendance, readings, online forum participation and assessment preparation.

Representative texts and references

Brooks, C. J., Grow, C., Craig, P., & Short, D. (2018). Cybersecurity Essentials. Wiley.

Meeuwisse, R. (2022). The Cybersecurity to English Dictionary. 5th Ed. Cyber Simplicity Ltd. 

Steinberg, J. (2019). Cybersecurity for Dummies. Wiley.

Ayala, L. (2016). Cybersecurity lexicon (Vol. 158). New York, NY: Apress

Sutton, D. (2022). Cyber security : the complete guide to cyber threats and protection (2nd ed.). BCS Learning and Development Limited.

Ozkaya, E. (2019). Cybersecurity : the beginner’s guide : a comprehensive guide to getting started in cybersecurity. Packt.

Maglaras, L., Kantzavelou, I., & Ferrag, M. A. (2021). Cyber Security of Critical Infrastructures. MDPI - Multidisciplinary Digital Publishing Institute.

NIST Cybersecurity Framework – https://www.nist.gov/cyberframework

TryHackMe & CyberStart – Gamified cybersecurity training tools

Microsoft Threat Modelling Tool (STRIDE), https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs