Unit rationale, description and aim

Cyber security is the practice of protecting networks, computer systems, and data from malicious attacks. With the increasing threats of data breach and leaks in our interconnected world, fintech companies, hospitals, government agencies, and every other sector are investing in cybersecurity infrastructure to protect their data and consumers from malicious attacks. However, there is a global shortage of cyber security experts and this number is growing every year.

This unit introduces students to the foundational principles of cybersecurity in both personal and professional digital environments. It serves as a foundation for more advanced cybersecurity topics in later units, providing essential knowledge and skills that support further study in information security. The unit covers cybersecurity goals, digital safety, and practical security awareness, highlighting the increasing importance of secure online behaviour and privacy. Students will explore cybersecurity concepts such as cyber hygiene, cyber threats, frameworks, ethics, and legal responsibilities. Emphasis is placed on real-world applications of these concepts through case studies, practical tools, and collaborative activities. The unit is designed for both IT and non-IT students and aims to develop a baseline understanding of cybersecurity, enabling learners to apply safe practices and contribute to the digital safety of organisations and communities.

2026 10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 1Multi-mode
  • Semester 2Multi-mode
  • Term Mode
  • ACU Term 3Online Unscheduled

Prerequisites

Nil

Incompatible

ITEC326 Information Systems Security , ITEC204 Introduction to Cyber Security

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Explain key cybersecurity concepts and essential d...

Learning Outcome 01

Explain key cybersecurity concepts and essential digital safety practices to develop a foundational understanding of secure online behaviour
Relevant Graduate Capabilities: GC1, GC8

Identify common cyber threats and appropriate prev...

Learning Outcome 02

Identify common cyber threats and appropriate preventative measures by referring to real-life digital security incidents
Relevant Graduate Capabilities: GC2, GC8

Apply knowledge of cybersecurity frameworks to exp...

Learning Outcome 03

Apply knowledge of cybersecurity frameworks to explore different job roles and possible career paths in the cybersecurity industry.
Relevant Graduate Capabilities: GC2, GC11

Analyse ethical and legal considerations in digita...

Learning Outcome 04

Analyse ethical and legal considerations in digital environments and their implications for individuals, organisations, and society.
Relevant Graduate Capabilities: GC2, GC7

Content

Topics will include:

  • Introduction to Cybersecurity & Digital Citizenship
  • Cyber Hygiene & Best Practices
  • Cyber Threats in Everyday Life
  • Cybersecurity and Mobile, IoT, and Social Media
  • Cybercrime and Reporting Mechanisms
  • Cybersecurity Careers and Roles
  • Cybersecurity Frameworks & Compliance (Non-technical)
  • Cyber Ethics and AI
  • Encryption & Data Protection (Introductory)
  • Case Studies of Major Cyber Incidents
  • Gamified Cybersecurity & Simulation Tools
  • Final Project Brief & Wrap-Up

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with university assessment requirements. The first assessment item includes a number of weekly labs designed to apply theoretical knowledge in a lab environment. The purpose of this item is to give students the opportunity of gaining essential knowledge on fundamental concepts of IT. The second assessment item is a scientific report, where students will assess risk factors of an IT system in an organisation and recommend appropriate countermeasures. The purpose of this assessment is to assess students’ critical and analytical ability to delve into complex concepts about cyber security through reflection and collaboration. The final assessment is an open book exam, where students will study several case studies, critically analyse them and answer a number of open-ended questions. The purpose of this assessment is to test students’ ability to apply their knowledge and skills in solving problems.

Strategies aligned with transition pedagogies will be utilised to facilitate successful completion of the unit assessment tasks. For each assessment, there will be the incorporation of developmentally staged tasks with a focus on a progressive approach to learning. This will be achieved through activities, including regular feedback, particularly early in the unit of study to support their learning; strategies to develop and understand discipline-specific concepts and terminology; in-class practice tasks with integrated feedback; and greater peer-to-peer collaboration.

The assessments for this unit are designed to demonstrate the achievement of each learning outcome. To pass this unit, students are required to obtain an overall mark of at least 50%.

Overview of assessments

Assessment 1: Cyber Hygiene Reflection Task In t...

Assessment 1: Cyber Hygiene Reflection Task

In this individual assessment, students will complete a cyber hygiene checklist and reflect critically on their personal cybersecurity practices. The task encourages self-awareness and the application of foundational cybersecurity concepts in everyday digital behaviour.

Submission Type: Individual

Assessment Method: Report

Artefact: Written report (100 words)

Weighting

25%

Learning Outcomes LO1
Graduate Capabilities GC1, GC8

Task 2: Case Study Analysis Report This group ta...

Task 2: Case Study Analysis Report

This group task involves analysing a major real-world cybersecurity incident. Students will evaluate the technical, ethical, and social implications of the incident, working collaboratively to produce a comprehensive written report. Individual contributions must be clearly documented and will be assessed to ensure accountability. This assessment fosters teamwork, research, and analytical skills.

Submission Type: Group

Assessment Method: Report

Artefact: Written report (2000 words)

Weighting

35%

Learning Outcomes LO2, LO3, LO4
Graduate Capabilities GC2, GC7, GC8, GC11

Assessment 3: Final Project Report Students will...

Assessment 3: Final Project Report

Students will interact with each other via discussion forum and develop a cybersecurity awareness project report or a response scenario. This task assesses students' ability to communicate cybersecurity knowledge effectively to a wider audience and demonstrate their understanding of core concepts through creative or practical application.

Submission Type: Individual

Assessment Method: Report

Artefact: Written report (1800 words)

Weighting

40%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC7, GC11

Learning and teaching strategy and rationale

Mode of delivery: This unit is offered mainly in ‘Attendance mode’ with aspects of ‘Multi-mode’ incorporated into the delivery to maximise the learning support offered to students. Students will be required to attend face-to-face workshops in specific physical location/s (including supervised lab practical sessions) and have face-to-face interactions with teaching staff to further their achievement of the learning outcomes. This unit is also structured with some required upfront preparation before workshops – learning materials and tasks set via online learning platforms. This will provide multiple forms of preparatory and practice opportunities for students to prepare and revise.

ACU Online: This unit uses an active learning approach to support students in the exploration of knowledge essential to the discipline. Students are provided with choice and variety in how they learn. Students are encouraged to contribute to asynchronous weekly discussions. Active learning opportunities provide students with opportunities to practice and apply their learning in situations similar to their future professions. Activities encourage students to bring their own examples to demonstrate understanding, application and engage constructively with their peers. Students receive regular and timely feedback on their learning, which includes information on their progress.

Further to this, to ensure students are ready to transition from the Diploma and articulate into the second year of undergraduate study, transition pedagogies will be incorporated into the unit as the key point of differentiation from the standard unit. This focuses on an active and engaging approach to learning and teaching practices, and a scaffolded approach to the delivery of curriculum to enhance student learning in a supportive environment. This will ensure that students develop foundation level discipline-based knowledge, skills and attributes, and simultaneously the academic competencies required of students to succeed in this unit.

Representative texts and references

Representative texts and references

Brooks, C. J., Grow, C., Craig, P., & Short, D. (2018). Cybersecurity Essentials. Wiley.

Meeuwisse, R. (2022). The Cybersecurity to English Dictionary. 5th Ed. Cyber Simplicity Ltd. 

Steinberg, J. (2019). Cybersecurity for Dummies. Wiley.

Ayala, L. (2016). Cybersecurity lexicon (Vol. 158). New York, NY: Apress

Sutton, D. (2022). Cyber security : the complete guide to cyber threats and protection (2nd ed.). BCS Learning and Development Limited.

Ozkaya, E. (2019). Cybersecurity : the beginner’s guide : a comprehensive guide to getting started in cybersecurity. Packt.

Maglaras, L., Kantzavelou, I., & Ferrag, M. A. (2021). Cyber Security of Critical Infrastructures. MDPI - Multidisciplinary Digital Publishing Institute.

NIST Cybersecurity Framework – https://www.nist.gov/cyberframework

TryHackMe & CyberStart – Gamified cybersecurity training tools

Microsoft Threat Modelling Tool (STRIDE), https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs