Overview

To view overview information, please select an offering from the drop-down menu above.

Academic contacts

To view unit coordinator information, please select an offering from the drop-down menu above.

Offerings

DUBAI-ISC-TJD-FACE2FACE-2025-2025
DUBAI-ISC-TMD-FACE2FACE-2026-2026
DUBAI-ISC-TSD-FACE2FACE-2025-2025
KAPLAN-SGP-TJA-FACE2FACE-2025-2025
KAPLAN-SGP-TMA-FACE2FACE-2026-2026
KAPLAN-SGP-TSA-FACE2FACE-2025-2025
MALAYSIAKL-TJC-FACE2FACE-2025-2025
MALAYSIAKL-TMC-FACE2FACE-2026-2026
MALAYSIAKL-TSC-FACE2FACE-2025-2025
MURDOCH-S2-FACE2FACE-2025-ONGOING
MURDOCH-S2-ONLINESCHD-2025-ONGOING

Other learning activities

To view other learning activity information, please select an offering from the drop-down menu above.

Learning activities

To view learning activity information, please select an offering from the drop-down menu above.

Learning outcomes

1.

Understand the fundamentals of computer security and the different layers of security architectures in computer systems.

2.

Design and implement secure authentication and access control mechanisms for computer systems.

3.

Differentiate cryptographic techniques and network security mechanisms, such as firewall, IDS, WAF, and apply them in practice.

4.

Select sources of auditing information and analyse the collected data to identify possible incidents.

5.

Analyse and implement the security of Cloud and IoT/OT deployments. 

6.

Analyse the architectural security of systems to identify weaknesses and develop the mechanisms necessary to detect, mitigate or resolve these.

Assessments

To view assessment information, please select an offering from the drop-down menu above.

Additional information

Unit content:

The unit is organised in these topics:

  1. Computer and Information Security Principles
  2. Access Control, e.g. access control theory, Windows Active Directory
  3. Authentication, e.g. authentication concepts and factors
  4. Security architecture, security models, systems evaluation, covert channels
  5. Cryptography (symmetric)
  6. Cryptography (asymmetric/public-key)
  7. Network Security, e.g. IPSec, SSL/TLS, DNSSEC
  8. Security Systems, e.g. Firewalls, IDS, Honeypots, WAF, EDR
  9. Auditing, Analysis, Incident Reporting
  10. Cloud Security, IoT/OT Security
  11. Emerging Trends