Unit rationale, description and aim

With the increasing reliance on technology, it is becoming more and more essential to secure every aspect of online information and data. Therefore, network security is very critical for any organisation and is essential to protecting client data. This unit covers the advanced network security concepts that require to developing students’ knowledge and practical skills in digital communication and security.

This advanced unit explores the theoretical foundations and current landscape of cryptography, covering essential concepts required to understand complex security challenges in networked environments. The unit contents include networking concepts, classical cipher design and analysis, key management, digital signatures and hash algorithms, wireless security, web security, email security and data stewardship. The unit also focuses on applications of network security tools to prevent or detect security attacks. The aim of this unit is to provide students with a good understanding of network security issues and the importance of data stewardship, as well as the knowledge and skills they need to plan, design or implement in order to secure a networked environment.

2026 10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 2Campus Attendance

Prerequisites

ITEC204 Introduction to Cyber Security OR ITEC326 Information Systems Security

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Demonstrate knowledge on security services, securi...

Learning Outcome 01

Demonstrate knowledge on security services, security attacks, a wide range of vulnerabilities, potential threats to networks and systems
Relevant Graduate Capabilities: GC1, GC10

Apply knowledge and skills in selecting appropriat...

Learning Outcome 02

Apply knowledge and skills in selecting appropriate cryptographic tools to provide the required security services and ensure common good through data stewardship
Relevant Graduate Capabilities: GC1, GC6

Utilise different network security tools and appli...

Learning Outcome 03

Utilise different network security tools and applications to analyse security strength of existing control measures
Relevant Graduate Capabilities: GC2, GC10

Design and integrate numerous security mechanisms ...

Learning Outcome 04

Design and integrate numerous security mechanisms for an organisation to mitigate vulnerabilities and threats
Relevant Graduate Capabilities: GC8, GC10

Content

Topics will include:

  • Introduction to network security
  • Unix programming
  • Programming in Shell Script
  • Key management
  • Data stewardship
  • Advanced cryptography
  • Authentication and password
  • Access control
  • Firewall and IDS
  • Email security
  • Wireless network security
  • Security tools

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment item consists of a number of weekly practical tasks which will give students the opportunity to implement their theoretical knowledge to solve problems in a practical environment. The second assessment item is a design report, where students will write a report on a given case study. The purpose of this assessment is to assess the students’ ability to apply their theoretical knowledge and design an effective solution to countermeasure security threats through collaborative learning. The final assessment is an open book exam, where students will study several case studies, critically analyse them and answer a number of open-ended questions. The purpose of this assessment is to test students’ ability to apply professional skills and practices in solving numerous problems.

The assessments for this unit are designed to demonstrate the achievement of each learning outcome. To pass this unit, students are required to:

  • obtain an overall mark of at least 50%
  • attempt all three assessment items

Overview of assessments

Assessment Task 1: Practical Assessments This a...

Assessment Task 1:

Practical Assessments

This assessment consists of a series of weekly lab exercises where students are required to apply different network security tools and techniques to solve practical problems.

The feedback from this assessment will help students to understand critical concepts of network security and their applications.


Submission Type: Individual

Assessment Method: Practical task

Artefact: Source Code/ Code Documentation

Weighting

20%

Learning Outcomes LO1, LO3
Graduate Capabilities GC1, GC2, GC10

Assessment Task 2: Reflective report on a case st...

Assessment Task 2: Reflective report on a case study

For this assessment tasks, students need to actively participate in online discussion forum to understand complex concepts through collaboration and self-reflection. They also required to write a 2500-word report reflecting their critical analysis on a contemporary issue of network security and its impact on the common good.

The purpose of this assessment is to assess the students’ critical and analytical ability to delve into complex concepts of network security.

Submission Type: Group

Assessment Method: Scientific report

Artefact: Written report + Online Viva

Weighting

30%

Learning Outcomes LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC6, GC10

Assessment Task 3: Exam This assessment task tes...

Assessment Task 3: Exam

This assessment task tests the students’ grasp of both theoretical and practical aspects of the unit. The students will study several case studies, critically analyse them and answer a number of open-ended questions. They also have to use network security tools to investigate the given scenarios and justify the outcomes.   

Submission Type: Individual

Assessment Method: Respondus Secure Exam

Artefact: Respondus Secure Exam

Weighting

50%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC8, GC10

Learning and teaching strategy and rationale

This unit is offered in two delivery modes—Attendance and Online—to support diverse learning needs and maximise access for isolated or marginalised groups.

Attendance Mode

Students attend weekly face-to-face classes at designated locations and engage directly with lecturers to support achievement of learning outcomes. The unit requires preparation before workshops (typically around one hour) and at least one hour of consolidation afterwards. Online learning platforms provide additional preparatory and practice activities to reinforce learning.

Online Mode

The online mode enables students to explore core disciplinary knowledge through both synchronous and asynchronous learning. Weekly discussion activities and active learning tasks encourage the application of theoretical concepts in professional contexts. Engagement with peers supports constructive learning, and students receive regular, timely feedback throughout the semester.

Across both modes, students should expect to commit approximately 150 hours to the unit, including class activities, readings, online participation and assessment preparation.

Representative texts and references

Representative texts and references

Stallings, W. (2020). Cryptography and network security: Principles and practice (8th ed.). Pearson Education.

Stallings, W., & Brown, L. (2023). Computer security: Principles and practice (5th ed.). Pearson Education.

Pfleeger, C., Pfleeger, S. L., & Coles-Kemp, L. (2023). Security in computing (6th ed.). Pearson Education.

Anderson, R. (2020). Security engineering: A guide to building dependable distributed systems (3rd ed.). Wiley.

Whitman, M. E., & Mattord, H. J. (2021). Principles of information security (7th ed.). Cengage Learning.

Easttom, W. (2023). Network defense and countermeasures: Principles and practices (4th ed.). Pearson Education.

Stamp, M. (2021). Information security: Principles and practice (3rd ed.). Wiley.

Jukic, N., Vrbsky, S. V., & Nestorov, B. (2021). Database systems: Introduction to databases and data warehouses (2nd ed.). Prospect Press.

Vacca, J. R. (2022). Computer and information security handbook (4th ed.). Academic Press.

Ross, S. J. (2022). Cybersecurity and privacy in the digital age: A practical guide to understanding threats 

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs