Overview
To view overview information, please select an offering from the drop-down menu above.
Academic contacts
To view unit coordinator information, please select an offering from the drop-down menu above.
Offerings
DUBAI-ISC-TJD-FACE2FACE-2025-2025
DUBAI-ISC-TMD-FACE2FACE-2026-2026
DUBAI-ISC-TSD-FACE2FACE-2025-2025
KAPLAN-SGP-TJA-FACE2FACE-2025-2025
KAPLAN-SGP-TMA-FACE2FACE-2026-2026
KAPLAN-SGP-TSA-FACE2FACE-2025-2025
MALAYSIAKL-TJC-FACE2FACE-2025-2025
MALAYSIAKL-TMC-FACE2FACE-2026-2026
MALAYSIAKL-TSC-FACE2FACE-2025-2025
MURDOCH-S2-FACE2FACE-2025-ONGOING
MURDOCH-S2-ONLINESCHD-2025-ONGOING
Requisites
Prerequisite
Exclusion
Other learning activities
To view other learning activity information, please select an offering from the drop-down menu above.
Learning activities
To view learning activity information, please select an offering from the drop-down menu above.
Learning outcomes
1.
Understand the fundamentals of computer security and the different layers of security architectures in computer systems.
2.
Design and implement secure authentication and access control mechanisms for computer systems.
3.
Differentiate cryptographic techniques and network security mechanisms, such as firewall, IDS, WAF, and apply them in practice.
4.
Select sources of auditing information and analyse the collected data to identify possible incidents.
5.
Analyse and implement the security of Cloud and IoT/OT deployments.
6.
Analyse the architectural security of systems to identify weaknesses and develop the mechanisms necessary to detect, mitigate or resolve these.
Assessments
To view assessment information, please select an offering from the drop-down menu above.
Additional information
Unit content:
The unit is organised in these topics:
- Computer and Information Security Principles
- Access Control, e.g. access control theory, Windows Active Directory
- Authentication, e.g. authentication concepts and factors
- Security architecture, security models, systems evaluation, covert channels
- Cryptography (symmetric)
- Cryptography (asymmetric/public-key)
- Network Security, e.g. IPSec, SSL/TLS, DNSSEC
- Security Systems, e.g. Firewalls, IDS, Honeypots, WAF, EDR
- Auditing, Analysis, Incident Reporting
- Cloud Security, IoT/OT Security
- Emerging Trends