CQUniversity Unit Profile
COIT20262 Advanced Network Security
Advanced Network Security
All details in this unit profile for COIT20262 have been officially approved by CQUniversity and represent a learning partnership between the University and you (our student).
The information will not be changed unless absolutely necessary and any change will be clearly indicated by an approved correction included in the profile.
General Information

Overview

This unit provides student with a complete understanding of how to protect the integrity, confidentiality, and availability of information and network services in business organisations. Students will study advanced topics in security technology including access control and authentication, firewalls, wireless network security, intrusion detection systems and cryptographic techniques and their applications. The unit provides the knowledge requirements to sit the CompTIA Security and industry standard certification examination should students choose to once they have gained the required industry experience. Note: If students have undertaken COIS23001 Network Security then this unit cannot be taken.

Details

Career Level: Postgraduate
Unit Level: Level 9
Credit Points: 6
Student Contribution Band: 8
Fraction of Full-Time Student Load: 0.125

Pre-requisites or Co-requisites

Prerequisite: COIT20261 Network Routing and Switching

Important note: Students enrolled in a subsequent unit who failed their pre-requisite unit, should drop the subsequent unit before the census date or within 10 working days of Fail grade notification. Students who do not drop the unit in this timeframe cannot later drop the unit without academic and financial liability. See details in the Assessment Policy and Procedure (Higher Education Coursework).

Offerings For Term 1 - 2017

Brisbane
Distance
Melbourne
Rockhampton
Sydney

Attendance Requirements

All on-campus students are expected to attend scheduled classes – in some units, these classes are identified as a mandatory (pass/fail) component and attendance is compulsory. International students, on a student visa, must maintain a full time study load and meet both attendance and academic progress requirements in each study period (satisfactory attendance for International students is defined as maintaining at least an 80% attendance record).

Class and Assessment Overview

Recommended Student Time Commitment

Each 6-credit Postgraduate unit at CQUniversity requires an overall time commitment of an average of 12.5 hours of study per week, making a total of 150 hours for the unit.

Class Timetable

Bundaberg, Cairns, Emerald, Gladstone, Mackay, Rockhampton, Townsville
Adelaide, Brisbane, Melbourne, Perth, Sydney

Assessment Overview

1. Practical and Written Assessment
Weighting: 40%
2. Group Discussion
Weighting: 10%
3. Practical and Written Assessment
Weighting: 50%

Assessment Grading

This is a graded unit: your overall grade will be calculated from the marks or grades for each assessment task, based on the relative weightings shown in the table above. You must obtain an overall mark for the unit of at least 50%, or an overall grade of ‘pass’ in order to pass the unit. If any ‘pass/fail’ tasks are shown in the table above they must also be completed successfully (‘pass’ grade). You must also meet any minimum mark requirements specified for a particular assessment task, as detailed in the ‘assessment task’ section (note that in some instances, the minimum mark for a task may be greater than 50%). Consult the University’s Grades and Results Policy for more details of interim results and final grades.

Previous Student Feedback

Feedback, Recommendations and Responses

Every unit is reviewed for enhancement each year. At the most recent review, the following staff and student feedback items were identified and recommendations were made.

Feedback from student feedback

Feedback

more practical classes

Recommendation

need a dedicated lab on each campus as previously recommended

Action

A dedicated physical lab on each campus is difficult to resource. However in 2017 the workshop content has been changed significantly to allow more practical tasks. Specifically, virtualisation software is used allowing every student to perform tasks equivalent to that in a dedicated lab, but on their own computer. They can do this on a CQU lab computer or own laptop (prior to 2017 CQU lab computers could not be used due to software requirements). As a result students have access to their own computer network, almost equivalent to what a dedicated physical lab would provide.

Unit Learning Outcomes
On successful completion of this unit, you will be able to:
  1. Plan organisational adoption of security controls such as proxies, firewalls and intrusion detection systems.
  2. Design secure wired and wireless network infrastructure with encryption and enterprise level authentication.
  3. Synthesise the knowledge gained in the unit to address organisational security using policies and procedures, hardware and software.
  4. Formulate security countermeasures to reduce potential security risks.
  5. Analyse emerging security threats and controls.

Australian Computer Society (ACS) recognises the Skills Framework for the Information Age (SFIA). SFIA is in use in over 100 countries and provides a widely used and consistent definition of ICT skills. SFIA is increasingly being used when developing job descriptions and role profiles.
ACS members can use the tool MySFIA to build a skills profile at https://www.acs.org.au/professionalrecognition/mysfia-b2c.html
This unit contributes to the following workplace skills as defined by SFIA. The SFIA code is included:
  • Information Security (SCTY)
  • Security Administration (SCAD)
  • Information Assurance (INAS)
  • Technical Specialism (TECH)
  • Consultancy (CNSL)
  • IT Governance (GOVN)

Alignment of Learning Outcomes, Assessment and Graduate Attributes
N/A Level
Introductory Level
Intermediate Level
Graduate Level
Professional Level
Advanced Level

Alignment of Assessment Tasks to Learning Outcomes

Assessment Tasks Learning Outcomes
1 2 3 4 5
1 - Practical and Written Assessment - 40%
2 - Group Discussion - 10%
3 - Practical and Written Assessment - 50%

Alignment of Graduate Attributes to Learning Outcomes

Graduate Attributes Learning Outcomes
1 2 3 4 5
1 - Knowledge
2 - Communication
3 - Cognitive, technical and creative skills
4 - Research
5 - Self-management
6 - Ethical and Professional Responsibility
7 - Leadership
8 - Aboriginal and Torres Strait Islander Cultures

Alignment of Assessment Tasks to Graduate Attributes

Assessment Tasks Graduate Attributes
1 2 3 4 5 6 7 8
1 - Practical and Written Assessment - 40%
2 - Group Discussion - 10%
3 - Practical and Written Assessment - 50%
Textbooks and Resources

Textbooks

Prescribed

Guide to Firewall & VPNs

Edition: 3rd (Note: Chapters 4, 5, 6, 7, and 10 only) (2012)
Authors: Michael E. Whitman, Herbert J. Mattord, Andrew Green
Cengage Learning
Boston Boston , USA
Binding: Paperback
Prescribed

Guide to Network Defense and Countermeasures

Edition: 3rd (Note: Chapters 3 and 8 only) (2013)
Authors: Randy Weaver, Dawn Weaver and Dean Farwood
Cengage Learning
Boston Boston , USA
Binding: Paperback
Prescribed

Security + Guide to Network Security Fundamentals

Edition: 5th (2014)
Authors: Mark Ciampa
Cengage Learning
Boston Boston , USA
Binding: Paperback

Additional Textbook Information

A special e-book containing relevant chapters from each of the three textbooks for this course is available from the publisher at:

https://www.cengagebrain.com.au/shop/en/AU/storefront/australia?cmd=CLHeaderSearch&fieldValue=CP1069

Purchase this e-book instead of the three individual textbooks.

IT Resources

You will need access to the following IT resources:
  • CQUniversity Student Email
  • Internet
  • Unit Website (Moodle)
  • GPG
  • Snort
  • VirtualBox
  • Wireshark
Referencing Style

All submissions for this unit must use the referencing style: Harvard (author-date)

For further information, see the Assessment Tasks.

Teaching Contacts
Steven Gordon Unit Coordinator
s.d.gordon@cqu.edu.au
Schedule
Week 1 Begin Date: 06 Mar 2017

Module/Topic

Introduction to Network Security

Chapter

Ciampa: Chapter 1

Events and Submissions/Topic

Week 2 Begin Date: 13 Mar 2017

Module/Topic

Attacks: Malware, Social Engineering, Application and Network-based Attacks

Chapter

Ciampa: Chapters 2 & 3

Events and Submissions/Topic

Week 3 Begin Date: 20 Mar 2017

Module/Topic

Vulnerability Assessment; and Host, Application, and Data Security

Chapter

Ciampa: Chapters 15 & 4

Events and Submissions/Topic

Week 4 Begin Date: 27 Mar 2017

Module/Topic

Cryptography

Chapter

Ciampa: Chapter 5

Events and Submissions/Topic

Peerwise Learning Activity Q1 due 9am Monday

Week 5 Begin Date: 03 Apr 2017

Module/Topic

Introduction to Firewalls and Packet Filtering

Chapter

Whitman: Chapters 4 & 5

Events and Submissions/Topic

Vacation Week Begin Date: 10 Apr 2017

Module/Topic

Chapter

Events and Submissions/Topic

Week 6 Begin Date: 17 Apr 2017

Module/Topic

Firewall Configuration and Proxy Servers

Chapter

Whitman: Chapters 6 & 7

Events and Submissions/Topic

Peerwise Learning Activity Q2 due 9am Monday


Assignment 1 Due: Week 6 Friday (21 Apr 2017) 5:00 pm AEST
Week 7 Begin Date: 24 Apr 2017

Module/Topic

Authentication

Chapter

Ciampa: Chapter 12

Events and Submissions/Topic

Week 8 Begin Date: 01 May 2017

Module/Topic

Access Control

Chapter

Ciampa: Chapter 11

Events and Submissions/Topic

Peerwise Learning Activity Q3 due 9am Monday

Week 9 Begin Date: 08 May 2017

Module/Topic

Internet Security

Chapter

Ciampa: Chapter 12; Weaver: Chapter 12

Events and Submissions/Topic

Week 10 Begin Date: 15 May 2017

Module/Topic

Virtual Private Networks

Chapter

Weaver: Chapter 11; Whitman: Chapter 10

Events and Submissions/Topic

Peerwise Learning Activity Q4 due 9am Monday

Week 11 Begin Date: 22 May 2017

Module/Topic

Wireless Network Security

Chapter

Ciampa: Chapter 9

Events and Submissions/Topic

Week 12 Begin Date: 29 May 2017

Module/Topic

Intrusion Detection and Prevention Systems

Chapter

Weaver: Chapter 8

Events and Submissions/Topic

Peerwise Learning Activity Q5 due 9am Monday


Assignment 2 Due: Week 12 Friday (2 June 2017) 5:00 pm AEST
Review/Exam Week Begin Date: 05 Jun 2017

Module/Topic

Chapter

Events and Submissions/Topic

Exam Week Begin Date: 12 Jun 2017

Module/Topic

Chapter

Events and Submissions/Topic

Assessment Tasks

1 Practical and Written Assessment

Assessment Title
Assignment 1

Task Description

This assignment requires you to apply knowledge from the lectures to solve practical problems, as well as to explore new topics not covered in detail in lectures. You will: use software to observe communications across a network, and applying the knowledge to identify security issues and/or design security mechanisms; design and configure firewalls as a means of network access control; study and apply cryptographic tools; research and report on state-of-the-art security malware, vulnerabilities and attacks, and possible countermeasures. There will be multiple questions on different topics, and you will be expected to submit a report containing answers. The report may be a mix of short answers, diagrams, tables, and short essays with references. Questions, and expected structure/format of the report, can be found on Moodle.


Assessment Due Date

Week 6 Friday (21 Apr 2017) 5:00 pm AEST


Return Date to Students

Week 8 Friday (5 May 2017)


Weighting
40%

Assessment Criteria

The assignment consists of multiple questions, each marked separately. In general, to obtain full marks the answer must be correct, and when an explanation is required, the answer must demonstrate understanding of the problem, solution and tradeoffs. Mark allocation for each question, the expected format of the answer, and details of the marking criteria can be found in the assignment on Moodle.


Referencing Style

Submission
Online

Learning Outcomes Assessed
  • Plan organisational adoption of security controls such as proxies, firewalls and intrusion detection systems.
  • Design secure wired and wireless network infrastructure with encryption and enterprise level authentication.
  • Synthesise the knowledge gained in the unit to address organisational security using policies and procedures, hardware and software.
  • Formulate security countermeasures to reduce potential security risks.
  • Analyse emerging security threats and controls.


Graduate Attributes
  • Knowledge
  • Cognitive, technical and creative skills
  • Research
  • Ethical and Professional Responsibility

2 Group Discussion

Assessment Title
PeerWise Learning Activity (PLA)

Task Description

This term you will be using a peer-directed learning activity called Peerwise. The goal is that you equally engage and participate in both spontaneous and formally structured student-student learning interactions. There will be five tasks during the term. In each task you must create a multiple choice question on the allocated topic, and must answer questions created by other students. Please refer to the Moodle site for a complete description of the task, including the number of questions to be answered.


Assessment Due Date

9am Monday morning in weeks 4, 6, 8, 10 and 12


Return Date to Students

On certification day


Weighting
10%

Assessment Criteria

For each of the five tasks, the creation of your own multiple choice question is worth 50% and the answering of other students multiple choice questions is worth 50%. For creating the question you will be assessed on the appropriateness and clarity of the question, the set of possible answers and the explanation of the correct answer. For answering other students questions you will be assessed on the number of questions answered and your feedback given on those answered questions. Peer assessment as well as instructor assessment will be used.

All submissions after the deadline will receive 0 marks. Late submissions will not be accepted. Submissions partly or fully copied from other sources (e.g. websites, textbook) are not allowed and will receive 0 marks for the entire task.


Referencing Style

Submission
Online

Learning Outcomes Assessed
  • Plan organisational adoption of security controls such as proxies, firewalls and intrusion detection systems.
  • Design secure wired and wireless network infrastructure with encryption and enterprise level authentication.
  • Synthesise the knowledge gained in the unit to address organisational security using policies and procedures, hardware and software.
  • Formulate security countermeasures to reduce potential security risks.
  • Analyse emerging security threats and controls.


Graduate Attributes
  • Knowledge
  • Communication
  • Cognitive, technical and creative skills
  • Research
  • Self-management
  • Ethical and Professional Responsibility

3 Practical and Written Assessment

Assessment Title
Assignment 2

Task Description

This assignment requires you to apply knowledge from the lectures to solve practical problems, focussing especially on current network security technologies. You will: use software to identify security attacks in network communications; use software to apply encryption techniques to provide confidentiality and authentication; identify problems and design solutions for securing communications in a private/public network. There will be multiple questions on different topics, and you will be expected to submit a report containing answers. The report may be a mix of short answers, diagrams, tables, and short essays with references. Questions, and expected structure/format of the report, can be found on Moodle.


Assessment Due Date

Week 12 Friday (2 June 2017) 5:00 pm AEST


Return Date to Students

On certification day


Weighting
50%

Assessment Criteria

The assignment consists of multiple questions, each marked separately. In general, to obtain full marks the answer must be correct, and when an explanation is required, the answer must demonstrate understanding of the problem, solution and tradeoffs. Mark allocation for each question, the expected format of the answer, and details of the marking criteria can be found in the assignment on Moodle.


Referencing Style

Submission
Online

Learning Outcomes Assessed
  • Plan organisational adoption of security controls such as proxies, firewalls and intrusion detection systems.
  • Design secure wired and wireless network infrastructure with encryption and enterprise level authentication.
  • Synthesise the knowledge gained in the unit to address organisational security using policies and procedures, hardware and software.
  • Formulate security countermeasures to reduce potential security risks.
  • Analyse emerging security threats and controls.


Graduate Attributes
  • Knowledge
  • Cognitive, technical and creative skills
  • Research
  • Ethical and Professional Responsibility

Academic Integrity Statement

As a CQUniversity student you are expected to act honestly in all aspects of your academic work.

Any assessable work undertaken or submitted for review or assessment must be your own work. Assessable work is any type of work you do to meet the assessment requirements in the unit, including draft work submitted for review and feedback and final work to be assessed.

When you use the ideas, words or data of others in your assessment, you must thoroughly and clearly acknowledge the source of this information by using the correct referencing style for your unit. Using others’ work without proper acknowledgement may be considered a form of intellectual dishonesty.

Participating honestly, respectfully, responsibly, and fairly in your university study ensures the CQUniversity qualification you earn will be valued as a true indication of your individual academic achievement and will continue to receive the respect and recognition it deserves.

As a student, you are responsible for reading and following CQUniversity’s policies, including the Student Academic Integrity Policy and Procedure. This policy sets out CQUniversity’s expectations of you to act with integrity, examples of academic integrity breaches to avoid, the processes used to address alleged breaches of academic integrity, and potential penalties.

What is a breach of academic integrity?

A breach of academic integrity includes but is not limited to plagiarism, self-plagiarism, collusion, cheating, contract cheating, and academic misconduct. The Student Academic Integrity Policy and Procedure defines what these terms mean and gives examples.

Why is academic integrity important?

A breach of academic integrity may result in one or more penalties, including suspension or even expulsion from the University. It can also have negative implications for student visas and future enrolment at CQUniversity or elsewhere. Students who engage in contract cheating also risk being blackmailed by contract cheating services.

Where can I get assistance?

For academic advice and guidance, the Academic Learning Centre (ALC) can support you in becoming confident in completing assessments with integrity and of high standard.

What can you do to act with integrity?