Unit rationale, description and aim

Cyber security is the practice of protecting networks, computer systems, and data from malicious attacks. With the increasing threats of data breach and leaks in our interconnected world, flntech companies, hospitals, government agencies, and every other sector are investing in cybersecurity infrastructure to protect their data and consumers from malicious attacks. However, there is a global shortage of cyber security experts and this number is growing every year. This unit is designed to help students develop a deeper understanding of modern information and cyber security challenges, mitigation techniques and tools.

The unit demonstrates the basic cyber security concepts, security tools and the common architectures used as industry standards. Students will learn how to defend against cyber threats and attacks and study existing techniques for managing security issues and maintaining the working environment.

The unit also covers ethical and legal issues in cyberspace to understand how cyber security affects legal compliance and solidarity in communities and society. The aim of this unit is to equip students with some background knowledge in cyber security, which scaffolds an advanced unit in network security.

2026 10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 1Campus Attendance

Prerequisites

Nil

Incompatible

ITEC326 Information Systems Security

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Explain key cybersecurity concepts and essential d...

Learning Outcome 01

Explain key cybersecurity concepts and essential digital safety practices to develop a foundational understanding of secure online behaviour.
Relevant Graduate Capabilities: GC1, GC10

Identify common cyber threats and appropriate prev...

Learning Outcome 02

Identify common cyber threats and appropriate preventative measures by referring to real-life digital security incidents.
Relevant Graduate Capabilities: GC2, GC8

Apply knowledge of cybersecurity frameworks to exp...

Learning Outcome 03

Apply knowledge of cybersecurity frameworks to explore different job roles and possible career paths in the cybersecurity industry.
Relevant Graduate Capabilities: GC2, GC11

Analyse ethical and legal considerations in digita...

Learning Outcome 04

Analyse ethical and legal considerations in digital environments and their implications for individuals, organisations, and society.
Relevant Graduate Capabilities: GC6, GC7

Content

Topics will include:

• Fundamental issues in cyber security

• Cybersecurity Cube

• Threats, Attacks & Vulnerabilities

• Basic cryptography

• Risk assessment and management

• Hash function and digital signature

• Web security

• Database security

• Digital Forensics

• Legal and ethical issues, privacy & social solidarity

•  Protecting a CS Domain


Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment item includes a number of weekly practical tasks designed to apply theoretical knowledge in a simulated environment. The purpose of this item is to give students the opportunity of gaining essential knowledge on fundamental concepts of IT. The second assessment item is a scientiflc report, where students will assess risk factors of an IT system in an organisation and recommend appropriate countermeasures. The purpose of this assessment is to assess students’ critical and analytical ability to delve into complex concepts about cyber security through reflection and collaboration. The final assessment consists of problem-solving tasks, where students will study several case studies, critically analyse them and answer a number of open-ended questions. The purpose of this assessment is to test students’ ability to apply their knowledge and skills in solving problems

The assessments for this unit are designed to demonstrate the achievement of each learning outcome. To pass this unit, students are required to obtain an overall mark of at least 50%.

Overview of assessments

Task 1: Cyber Hygiene Reflection Task In this in...

Task 1: Cyber Hygiene Reflection Task

In this individual assessment, students will complete a cyber hygiene checklist and reflect critically on their personal cybersecurity practices. The task encourages self-awareness and the application of foundational cybersecurity concepts in everyday digital behaviour.

 Submission Type: Individual

Assessment Method: Report

Artefact: Written report (800 words)

 

Weighting

25%

Learning Outcomes LO1
Graduate Capabilities GC1, GC8

Task 2: Case Study Analysis Report This group ta...

Task 2: Case Study Analysis Report

This group task involves analysing a major real-world cybersecurity incident. Students will evaluate the technical, ethical, and social implications of the incident, working collaboratively to produce a comprehensive written report. Students will use GenAI tools to critically analyse the case study and will critically evaluate and reflect on the GenAI generated report content. Individuals contributions must be clearly documented and will be assessed to ensure accountability. This assessment fosters teamwork, research, and analytical skills.


Submission Type: Group

Assessment Method:

Group live/recorded speaker view webcam overlay (5-8 minutes) + Online Viva

Weighting

35%

Learning Outcomes LO2, LO3
Graduate Capabilities GC2, GC7, GC8, GC11

Task 3: Final Project Report Students will inter...

Task 3: Final Project Report

Students will interact with each other via discussion forum and develop a cybersecurity awareness project report or a response scenario. This task assesses students' ability to communicate cybersecurity knowledge effectively to a wider audience and demonstrate their understanding of core concepts through creative or practical application.

 

Submission Type: Individual

Assessment Method: Report (1700 words) + Online Viva

Weighting

40%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC2, GC6, GC7, GC8, GC11

Learning and teaching strategy and rationale

This unit is offered in two delivery modes—Attendance and Online—to support diverse learning needs and maximise access for isolated or marginalised groups.

Attendance Mode

Students attend weekly face-to-face classes at designated locations and engage directly with lecturers to support achievement of learning outcomes. The unit requires preparation before workshops (typically around one hour) and at least one hour of consolidation afterwards. Online learning platforms provide additional preparatory and practice activities to reinforce learning.

Online Mode

The online mode enables students to explore core disciplinary knowledge through both synchronous and asynchronous learning. Weekly discussion activities and active learning tasks encourage the application of theoretical concepts in professional contexts. Engagement with peers supports constructive learning, and students receive regular, timely feedback throughout the semester.

Students should anticipate undertaking 150 hours of study for this unit, including class attendance, readings, online forum participation and assessment preparation.

Representative texts and references

Representative texts and references

Stallings W & Brown L, 2024, Computer Security: Principle and Practices, 5th Global Edition, Pearson US. Stallings W 2020, Cryptography & Network Security: Principles and Practices, 8th edn, Pearson US

Charles J. Brooks, Philip Craig, Donald Short, 2018 Cybersecurity Essentials, SYBEX, .

Anderson, R 2020, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd edn, Wiley.

Whitman, M & Mattord, H 2021, Principles of Information Security, 7th edn, Cengage, Boston, ISBN-13:978-1-337-10206-3.

Stamp, M. (2021). Information security: Principles and practice (3rd ed.). Wiley.

Easttom, W. (2023). Computer security fundamentals (5th ed.). Pearson.

Ciampa, M. (2022). CompTIA Security+ guide to network security fundamentals (7th ed.). Cengage.

Kizza, J. M. (2024). Guide to computer network security. Springer.

Aumasson, J.-P. (2024). Serious cryptography: A practical introduction to modern encryption (2nd ed.). No Starch Press.

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs