Unit rationale, description and aim
In today’s interconnected world, existing and emerging threats to privacy and security are of ever-growing concern and are no longer only concerns for IT professionals. Every individual, from students and employees to business owners, is at risk of a continuous stream of cyber threats. These threats, which encompass phishing scams, malware infections, data breaches, identity theft, and other forms of cyberattacks, can lead to significant personal and financial consequences for both individuals and businesses. Therefore, understanding the nature of security threats and being knowledgeable about the techniques and tools to counteract these threats is an essential skill for everyone.
This unit provides students with a foundational understanding of security concepts and the landscape of cybersecurity threats. It offers an introduction to strategies and tools that can help avoid common cyber threats, such as phishing emails, malware infections, and data breaches. Students will also explore the ethical and legal dimensions of cybersecurity, including issues surrounding data privacy and intellectual property rights.
The primary aim of this unit is to highlight the critical importance of cybersecurity awareness and to equip students with the knowledge and skills necessary to protect themselves and their information in the digital landscape.
Campus offering
No unit offerings are currently available for this unit.Learning outcomes
To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.
Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.
Explore the graduate capabilities.
Apply the knowledge on security and cybersecurity ...
Learning Outcome 01
Identify cyber threats and the consequences of cyb...
Learning Outcome 02
Apply the skills required to manage cyber threats
Learning Outcome 03
Examine cybersecurity solutions and technologies u...
Learning Outcome 04
Content
Topics will include:
- Security and cybersecurity concepts and foundations
- The importance of cybersecurity
- Cyber vulnerabilities, threats, and attacks
- Consequences of cybersecurity failures
- The ethical and legal dimensions of cybersecurity
- Knowledge and skills required for managing cyber threats
- Innovative cybersecurity solutions and technologies to prevent cyber threats
Assessment strategy and rationale
The assessment strategy is designed to progressively develop students’ knowledge and skills in cybersecurity, ensuring alignment with learning outcomes. To pass this unit, students must achieve an aggregate mark of at least 50% across all assessments. All assessments are marked using rubrics aligned with the learning outcomes. Students must demonstrate competency in cybersecurity concepts, application, and critical thinking to successfully complete the unit.
The first assessment is a reflective report, which will provide an opportunity for students to apply their cybersecurity knowledge in a practical context, demonstrating their understanding of cybersecurity threats and the implications of inadequate security practices.
The second assessment is an analytical report, requiring students to overview cyber threats and the consequences of cybersecurity failures, and demonstrate the solution they have implemented using the available AI tools for the assessment.
The final assessment is a real-world case study analysis, requiring students to apply cybersecurity principles and critically evaluate innovative solutions within an industry context. This task reinforces their understanding of cyber threats, management strategies, and emerging technologies while developing their ability to propose actionable recommendations.
Strategies aligned with transition pedagogies will be utilised to facilitate successful completion of the unit assessment tasks. For each assessment, there will be the incorporation of developmentally staged tasks with a focus on a progressive approach to learning. This will be achieved through activities, including regular feedback, particularly early in the unit of study to support their learning; strategies to develop and understand discipline-specific concepts and terminology; in-class practice tasks with integrated feedback; and greater peer-to-peer collaboration.
Overview of assessments
Assessment 1: Reflective report Students prepa...
Assessment 1: Reflective report
Students prepare a 800-word report analysing their daily online activities and the security measures on their devices. The report will involve reviewing and assessing their online behavior to identify potential weaknesses and threats. Students will then evaluate the risks associated with the security gaps and consider the potential consequences if such vulnerabilities were exploited. Additionally, the report will require students to identify the knowledge and skills needed to address these risks effectively. This assessment provides an opportunity for students to apply their cybersecurity knowledge in a practical context, demonstrating their understanding of cybersecurity threats and the implications of inadequate security practices.
20%
Assessment 2: Analytical report (1200 words) As ...
Assessment 2: Analytical report (1200 words)
As part of this assessment task, students will overview cyber threats and the consequences of cybersecurity failures, including the financial, emotional, and reputational impacts on individuals and organisations. The student will pick an organisation to contextualie their consequences.
Students are required to submit the program demonstrating the solution they have implemented using the available AI tools for the assessment.
35%
Assessment 3: Case study (1600 words) Students w...
Assessment 3: Case study (1600 words)
Students will analyse a case study focused on a cybersecurity scenario and develop a risk mitigation plan. This task requires identifying security weaknesses, proposing solutions that integrate current security technologies, and considering ethical and legal implications. In a 1600-word report, students will present their findings and recommendations in a report, demonstrating their ability to translate cybersecurity knowledge into practical strategies.
45%
Learning and teaching strategy and rationale
Students should anticipate undertaking 150 hours of study for this unit over the study period, including, readings, online forum participation and assessment preparation.
This unit is offered in different modes to cater to the learning needs and preferences of a range of participants and maximise effective participation for isolated and/or marginalised groups.
Attendance & Mult-mode: Students will require face-to-face attendance in blocks of time determined by the school. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for students to prepare and revise.
Online mode: This unit utilises an active learning approach whereby students will engage in e-module activities, readings and reflections, and opportunities to collaborate with peers in an online environment. This can involve, but is not limited to, online workshops, online discussion forums, chat rooms, guided reading, and webinars. Pre-recorded lectures will be incorporated within the online learning environment and e-modules. In addition, electronic readings will be provided to guide students’ reading and extend other aspects of online learning. Activities encourage students to bring their own examples to demonstrate understanding, application and engage constructively with their peers. Students receive regular and timely feedback on their learning, which includes information on their progress.
Further to this, to ensure students are ready to transition from the Diploma and articulate into the second year of undergraduate study, transition pedagogies will be incorporated into the unit as the key point of differentiation from the standard unit. This focuses on an active and engaging approach to learning and teaching practices, and a scaffolded approach to the delivery of curriculum to enhance student learning in a supportive environment. This will ensure that students develop foundation level discipline-based knowledge, skills and attributes, and simultaneously the academic competencies required of students to succeed in this unit.