Overview

To view overview information, please select an offering from the drop-down menu above.

Academic contacts

To view unit coordinator information, please select an offering from the drop-down menu above.

Offerings

DUBAI-ISC-TJD-INT-2023-2023
DUBAI-ISC-TJD-INT-2025-2025
DUBAI-ISC-TMD-INT-2024-2024
DUBAI-ISC-TMD-INT-2026-2026
DUBAI-ISC-TSD-INT-2023-2023
DUBAI-ISC-TSD-INT-2025-2025
KAPLAN-SGP-TJA-INT-2023-2023
KAPLAN-SGP-TJA-INT-2025-2025
KAPLAN-SGP-TMA-INT-2024-2024
KAPLAN-SGP-TMA-INT-2026-2026
KAPLAN-SGP-TSA-INT-2023-2023
KAPLAN-SGP-TSA-INT-2025-2025
MALAYSIAKL-TJC-INT-2025-2025
MALAYSIAKL-TMC-INT-2026-2026
MALAYSIAKL-TSC-INT-2025-2025
MURDOCH-S2-EXT-2018-ONGOING
MURDOCH-S2-INT-2018-ONGOING

Requisites

Prerequisite

Other learning activities

To view other learning activity information, please select an offering from the drop-down menu above.

Learning activities

To view learning activity information, please select an offering from the drop-down menu above.

Learning outcomes

1.

Understand the different layers of security architectures in computer systems.

2.

Design and implement secure authentication and access control mechanisms for computer systems.

3.

Differentiate cryptographic techniques and network security mechanisms and apply them in practice.

4.

Select sources of auditing information and analyse the collected data to identify possible incidents.

5.

Understand the principles of secure programming and analyse existing code for weaknesses.

6.

Demonstrate how to install and manage the security of Windows servers and networks.

7.

Analyse the architectural security of systems to identify weaknesses and develop the mechanisms necessary to detect, mitigate or resolve these.

Assessments

To view assessment information, please select an offering from the drop-down menu above.

Additional information

Unit content:

The unit is organised in these topics:

  1. Computer Security Principles
  2. Access Control
  3. Authentication
  4. Cryptography (symmetric)
  5. Cryptography (asymmetric/public-key)
  6. Network Security
  7. Secure Software Design
  8. Firewalls, IDS, Honeypots
  9. Auditing, Analysis, Incident Reporting
  10. Cloud Security
  11. Emerging Trends