Unit rationale, description and aim
As digital infrastructures become increasingly integral to business, government, and everyday life, the frequency and sophistication of cyber threats continue to rise. Professionals with the ability to understand, anticipate, and defend against these threats are in high demand across all sectors. Engaging with network and information security equips students with the expertise needed to protect critical systems, ensure data integrity, and uphold public trust in digital technologies.
This unit offers a critical awareness of current developments, industry practices, and future trends in network security, web security, database security, and wireless security. Students will explore a range of tools and techniques used to combat threats such as malware, intrusions, social engineering, data leakage, and zero-day attacks. These topics are examined through the lens of secure authentication mechanisms, password management, intrusion detection and prevention systems, information security policies, and user education. A hands-on component requires students to design a shell-script-based intrusion detection system (IDS), providing practical skills in identifying and responding to threats within a host system.
The aim of this unit is to provide students with a comprehensive understanding of network and information security issues, and to develop the knowledge and skills required to identify security threats and design appropriate countermeasures to protect systems and data.
Learning outcomes
To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.
Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.
Explore the graduate capabilities.
Synthesise knowledge on security goals, threats, v...
Learning Outcome 01
Apply knowledge and skills in selecting appropriat...
Learning Outcome 02
Design a host-based intrusion detection system (ID...
Learning Outcome 03
Comprehensively analyse and evaluate complex netwo...
Learning Outcome 04
Content
Topics will include:
- Introduction to network security
- Unix programming
- Shell scripting
- Data stewardship
- Key management
- Authentication and Password Management
- Firewall and IDS
- Email & Database security
- Wireless network security
- Web Security
- Security tools
Assessment strategy and rationale
A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment provides students with an opportunity to gain practical/hands-on skills. The second assessment task is designed to provide students an opportunity to apply their theoretical knowledge and skills and design a practical security solution. The last assessment provides students with an opportunity to test their grasp of theoretical and practical aspects of the unit.
To pass this unit, students must demonstrate competence in all learning outcomes and achieve an aggregate mark of at least 50%. Marking will be in accordance with a rubric specifically developed to measure students’ level of achievement of the learning outcomes for each item of assessment. Students will be awarded a final grade that signifies their overall achievement in the unit.
Overview of assessments
Assessment Task 1: Practical Assessment This ass...
Assessment Task 1: Practical Assessment
This assessment consists of hands on exercises where students are required to apply different network security tools and techniques to solve practical problems. The feedback from this assessment will help students to understand critical concepts of network security and their applications.
Submission Type: Individual
Assessment Method: Practical task
Artefact: Source Code/report
20%
Assessment Task 2: Designing an Intrusion Detecti...
Assessment Task 2: Designing an Intrusion Detection System using Shell Script
This assessment task consists of Shell Code and a report. This task requires students to develop professional skills through the application of theoretical knowledge and understanding of Unix programming concepts. The students are expected to develop an Intrusion Detection System (IDS) in Shell script to detect anomalies.
The purpose of this assessment is to assess the students’ ability to apply their theoretical knowledge and design an effective solution to countermeasure security threats through collaborative learning.
Submission Type: Group
Assessment Method: Implementation & Test report
Artefact: Shell Code and Report (1500 words) + Online Viva
30%
Assessment Task 3: Problem Solving This assessme...
Assessment Task 3: Problem Solving
This assessment task tests the students’ grasp of both theoretical and practical aspects of the unit. The students will study several case studies, critically analyse them and answer a number of open-ended questions. They also have to use network security tools to investigate the given scenarios and justify the outcomes.
Students explore the potential of using AI tools for network security applications.
Submission Type: Individual
Assessment Method: Case Study + Practical + Presentation
Artefact:
Program files/code + Live / Recorded with face-overlay Presentation (8 minutes) + Online Viva
50%
Learning and teaching strategy and rationale
This unit is delivered through Attendance and Online modes using a single, integrated learning and teaching strategy designed to ensure equivalent learning outcomes and a comparable learning experience for all students, while supporting diverse learning needs and maximising access.
Across both modes, learning activities are intentionally aligned to the unit learning outcomes and assessment tasks, and are underpinned by active learning, guided engagement with disciplinary knowledge, opportunities for peer interaction, and regular, timely feedback. While the mode of delivery shapes how students participate, the pedagogical intent, expectations and standards remain consistent.
In Attendance mode, students engage in weekly face-to-face classes at designated locations, supported by preparatory activities prior to workshops and opportunities for consolidation following classes. Online learning platforms are used to complement face-to-face teaching through additional resources and learning activities.
In Online mode, students engage with the same core content and learning outcomes through a combination of synchronous and asynchronous activities, including structured discussions and applied learning tasks that support learning in professional contexts.