Overview

To view overview information, please select an offering from the drop-down menu above.

Academic contacts

To view unit coordinator information, please select an offering from the drop-down menu above.

Offerings

KAPLAN-SGP-TJA-MIXEDMODE-2025-2025
KAPLAN-SGP-TJA-MIXEDMODE-2027-2027
KAPLAN-SGP-TMA-MIXEDMODE-2026-2026
KAPLAN-SGP-TSA-MIXEDMODE-2025-2025
KAPLAN-SGP-TSA-MIXEDMODE-2027-2027
MURDOCH-S1-FACE2FACE-2025-ONGOING
MURDOCH-S1-ONLINESCHD-2025-ONGOING

Enrolment rules

Enrolment in a graduate IT course or permission of the Academic Chair.

Other learning activities

To view other learning activity information, please select an offering from the drop-down menu above.

Learning activities

To view learning activity information, please select an offering from the drop-down menu above.

Learning outcomes

1.

Communicate the importance of security of both resources and data in terms of threat, vulnerability and protection

2.

Compare the different types and methods of securing an organisation's data and information technology infrastructure for the best outcome

3.

Devise the management of the security aspects of an organisation's IT infrastructure and data resources

4.

Evaluate the benefits and weaknesses of different methods of enforcing security, and appropriate methods for securing different types of systems.

5.

Demonstrate understanding of managerial and legal issues through analysing security reports, identifying organisational assets, possible threats and their security countermeasures, and conducting risk assessments.

6.

Analyse the impact of emerging technologies on IT security and the associated risk

Assessments

To view assessment information, please select an offering from the drop-down menu above.

Additional information

Unit content:

1. Introduction to the Management of Information Security  2. Planning for Security 3. Planning for Contingencies 4. Information Security Policy 5. Developing the Security Program 6. Risk Management: Identifying and assessing risks 7. Risk Management: Controlling risk 8. Security Management Models 9. Security Management Practices 10. Protection Mechanisms 11. Personnel Security  12. Unit Review