Overview
This unit is the capstone for the Networks and Information Security specialisation in the Master of Information Technology course. Students are required to demonstrate the skills that they have developed throughout their studies in this course and apply these skills to an authentic task group project or an industry project. Skills will be demonstrated through the conduct of a group project addressing the production of a research plan, project plan, a quality plan, progress reports and a project report, together with appropriate business analysis and process modelling artefacts such as process improvement models and requirements specifications, and a project report. The project will have a designated customer and students will be required to produce project management artefacts associated with a commercial project. Students will be expected to participate in both regular progress meetings involving relevant stakeholders and in technical meetings. Students are encouraged to include the artefacts produced in the project as part of a work portfolio. Note: If students have undertaken COIT20234 Advanced Network Security Project then this unit cannot be taken.
Details
Pre-requisites or Co-requisites
Prerequisites COIT20262 Advanced Network Security COIT20263 Information Security Management COIT20264 Network Design PPMP20007 Project Management Concepts
Important note: Students enrolled in a subsequent unit who failed their pre-requisite unit, should drop the subsequent unit before the census date or within 10 working days of Fail grade notification. Students who do not drop the unit in this timeframe cannot later drop the unit without academic and financial liability. See details in the Assessment Policy and Procedure (Higher Education Coursework).
Offerings For Term 1 - 2017
Attendance Requirements
All on-campus students are expected to attend scheduled classes – in some units, these classes are identified as a mandatory (pass/fail) component and attendance is compulsory. International students, on a student visa, must maintain a full time study load and meet both attendance and academic progress requirements in each study period (satisfactory attendance for International students is defined as maintaining at least an 80% attendance record).
Recommended Student Time Commitment
Each 12-credit Postgraduate unit at CQUniversity requires an overall time commitment of an average of 25 hours of study per week, making a total of 300 hours for the unit.
Class Timetable
Assessment Overview
Assessment Grading
This is a graded unit: your overall grade will be calculated from the marks or grades for each assessment task, based on the relative weightings shown in the table above. You must obtain an overall mark for the unit of at least 50%, or an overall grade of ‘pass’ in order to pass the unit. If any ‘pass/fail’ tasks are shown in the table above they must also be completed successfully (‘pass’ grade). You must also meet any minimum mark requirements specified for a particular assessment task, as detailed in the ‘assessment task’ section (note that in some instances, the minimum mark for a task may be greater than 50%). Consult the University’s Grades and Results Policy for more details of interim results and final grades.
All University policies are available on the CQUniversity Policy site.
You may wish to view these policies:
- Grades and Results Policy
- Assessment Policy and Procedure (Higher Education Coursework)
- Review of Grade Procedure
- Student Academic Integrity Policy and Procedure
- Monitoring Academic Progress (MAP) Policy and Procedure – Domestic Students
- Monitoring Academic Progress (MAP) Policy and Procedure – International Students
- Student Refund and Credit Balance Policy and Procedure
- Student Feedback – Compliments and Complaints Policy and Procedure
- Information and Communications Technology Acceptable Use Policy and Procedure
This list is not an exhaustive list of all University policies. The full list of University policies are available on the CQUniversity Policy site.
Feedback, Recommendations and Responses
Every unit is reviewed for enhancement each year. At the most recent review, the following staff and student feedback items were identified and recommendations were made.
Feedback from Course Evaluation
Students praised the problem-based learning and teaching approach of the course.
Continue refining the problem-based learning and teaching approach.
Students learning activities were carefully monitored to ensure their proposed solutions to the problem were founded and sound.
Feedback from Course Evaluation
Students enjoyed the practical involvement with a real world project.
Continue developing good case studies in the context of real world scenarios.
A new case study focused on the new realities of critical infrastructure and cyber security was written.
- Apply the concepts taught in network security specialisation units informed by research and professional best-practice.
- Assess systems for weaknesses and select and implement appropriate counter measures and controls.
- Evaluate security protections and assess their level of compliance and effectiveness.
- Identify “client” or customer requirements and propose solutions.
- Organise, manage and prioritise tasks in order to address complex real world problems.
- Select and apply task-appropriate project management and solution development methodologies.
- Demonstrate productive participation and contribution to a project team or work environment.
- Project Management (PRMG)
- IT Management (ITMG)
- Information Security (SCTY)
- Security Administration (SCAD)
- IT Governance (GOVN)
- Technical specialism (TECH)
- IT Operations (ITOP)
- Systems Installation/Decommissioning (HSIN)
- Network Support (NTAS)
- Network Planning (NTPL)
- Network Design (NTDS)
- System Design (DESN).
Alignment of Assessment Tasks to Learning Outcomes
Assessment Tasks | Learning Outcomes | ||||||
---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 | |
1 - Presentation and Written Assessment - 60% | |||||||
2 - Portfolio - 20% | |||||||
3 - Group Work - 20% |
Alignment of Graduate Attributes to Learning Outcomes
Graduate Attributes | Learning Outcomes | ||||||
---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 | |
1 - Knowledge | |||||||
2 - Communication | |||||||
3 - Cognitive, technical and creative skills | |||||||
4 - Research | |||||||
5 - Self-management | |||||||
6 - Ethical and Professional Responsibility | |||||||
7 - Leadership | |||||||
8 - Aboriginal and Torres Strait Islander Cultures |
Alignment of Assessment Tasks to Graduate Attributes
Assessment Tasks | Graduate Attributes | |||||||
---|---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | |
1 - Presentation and Written Assessment - 60% | ||||||||
2 - Portfolio - 20% | ||||||||
3 - Group Work - 20% |
Textbooks
There are no required textbooks.
Additional Textbook Information
This is a capstone unit and no textbooks are required.
IT Resources
- CQUniversity Student Email
- Internet
- Unit Website (Moodle)
All submissions for this unit must use the referencing style: Harvard (author-date)
For further information, see the Assessment Tasks.
e.arenas@cqu.edu.au
Module/Topic
Introduction to Network Security Project by mentor
Form project group
Chapter
No prescribed textbooks for this unit
Events and Submissions/Topic
Module/Topic
Weekly meeting with project mentor
Project selection
Chapter
Events and Submissions/Topic
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
Make entries in the Portfolio covering activities performed in this week.
Submit Portfolio
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
- Make entries in the Portfolio covering activities performed in this week.
- Submit DRAFT network security plan.
- Submit Project Plan.
- Submit Group Project Progress Report-1.
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
Module/Topic
Chapter
Events and Submissions/Topic
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
Make entries in the Portfolio covering activities performed in this week.
Submit Portfolio
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
- Make entries in the Portfolio covering activities performed in this week.
- Deliver Group Presentation of the implementation of proposed network security plan.
- Submit Group Project Progress Report-2.
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
- Make entries in the Portfolio covering activities performed in this week.
- Submit Portfolio
- Submit Group Project Progress Report-3.
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
Module/Topic
Weekly meeting with project mentor
Chapter
Events and Submissions/Topic
- Make entries in the Portfolio covering activities performed in this week.
- Deliver presentation of DRAFT Project Report and Technical Implementation.
- Submit Group Project Progress Report-4.
Module/Topic
Meeting with project mentor
Chapter
Events and Submissions/Topic
- Submit FINAL Project Report including Project Working Documents.
- Submit final portfolio covering activities performed from Week 1 to 12.
Module/Topic
Chapter
Events and Submissions/Topic
Module/Topic
Chapter
Events and Submissions/Topic
Dr. Edilson Arenas, Ph.D.
Discipline Leader – Networks and Information Security | School of Engineering and Technology, Higher Education Division
CQUniversity Australia, 120 Spencer Street, Melbourne, Victoria, 3000, Australia
Phone +61 03 96160570 | Email e.arenas@cqu.edu.au
1 Presentation and Written Assessment
This is the major assessment for your project and comprises five different parts:
- DRAFT network security plan (Week 4)
- Project plan (Week 4)
- Group presentation on the proposed implementation of Network Security Plan (Week 7)
- Project report and technical implementation (Week 12)
- Project Working Documents (Ancillary Documentation) (Week 12)
You are required to work on a project as a group with up to four team members.
Note: Please contact the unit coordinator if you have a genuine problem and are unable to participate in a group.
As per schedule in the Moodle unit website
On certification day
The project report and technical documentation will be assessed upon the quality of the content. This includes the presentation layout and the depth and breadth of project recommendations adhering to the implementation of a secured computer network. The assessment criteria for each part of the assessment described in the Task Description section is as follows:
Note: Please refer to the unit website in Moodle for submission due dates and detailed marking criteria.
DRAFT network security plan (5%)
Due: Friday, Week 4
You are required to submit a DRAFT network security plan that you believe will mitigate, enhance or address the network security of a chosen organisation (project case study).
Project plan (10%)
Due: Friday, Week 4
You are required to submit a project plan that will include at the minimum the following items: 1) a project charter outlining the project scope, objectives, constraints, statement of work, and project team members; 2) a RACI Matrix showing the roles and responsibilities of each team member; 3) a GANTT chart showing the work breakdown structure (WBS); and, 4) the project risks and proposed mitigation plan.
Group presentation of Network Security Plan(10% )
Due: Friday, Week 7
In this mid-term group presentation you will:
- present the summary of your network security plan that you have produced
- identify and justify your selection of key threats or security challenges to the chosen organisation
- explain what technologies you will implement to mitigate or address such threats and challenges
- describe how you will test the security technologies and the types of policies and/or procedures that you intend to produce
On-campus students: The date and time of this presentation will be determined by your local lecturer/tutor.
Distant students: The time of the presentation and the video conferencing technology employed will be determined on an individual basis.
Project working documents (Ancillary Documentation) (5% )
Due: Friday, Week 12
This submission includes the group’s important project artefacts/ documents such as outlines of the security plan produced prior to building a project plan, preliminary designs, agendas and minutes of team meetings. This document should be included in the FINAL project report as an Annex with appropriate title page.
Project report and technical implementation (30%)
Due: Friday, Week 12
This assessment is comprised of two different parts:
- Produce detailed network security plan
- Identify key security threats or challenges and implement technology to mitigate or address them.
Produce detailed network security plan
The project group is required to produce a detailed security plan for a chosen organisation in order to meet its network security threats and challenges.
Identify key security threats or challenges and implement technology to mitigate or address them
This is a practical activity that requires demonstration of the implementation of your group’s network security plan. Your group must identify key threats and challenges, and implement technology to mitigate or address them. The technology has to address key challenges to the organisation’s network environment. You should pick an area of network, infrastructure or security that you have already applied in your studies, but you would like to explore in-depth and implement.
Your group needs to show how that was implemented and how the tests were carried. Your group is also required to submit the technical documentation including a test plan, test results and any network security policies and/or procedures that result from your implementation test.
- Apply the concepts taught in network security specialisation units informed by research and professional best-practice.
- Assess systems for weaknesses and select and implement appropriate counter measures and controls.
- Evaluate security protections and assess their level of compliance and effectiveness.
- Identify “client” or customer requirements and propose solutions.
- Organise, manage and prioritise tasks in order to address complex real world problems.
- Select and apply task-appropriate project management and solution development methodologies.
- Demonstrate productive participation and contribution to a project team or work environment.
- Knowledge
- Communication
- Cognitive, technical and creative skills
- Research
- Self-management
- Ethical and Professional Responsibility
- Leadership
2 Portfolio
This is an individual assessment.
An e-portfolio is a learning tool that enables students to accumulate evidence of learning achievement. In this unit, you will use Mahara as the learning tool.
Please refer to the Moodle unit website for the assessment criteria and detailed instructions on how to create your Mahara portfolio.
Please refer to the unit website in Moodle for more details.
Within two weeks of submission
The project portfolio is to be maintained by every student individually.
Make entries in your portfolio on each occasion you undertake work on the project, for personal reflections and lessons learned. Essentially, use the portfolio to capture things like:
1) Tasks that you performed
2) Time spent
3) Your contributions to the overall project requirements
4) Challenges faced
5) Reflections
5) Bibliography of researched resource materials such as technical journals, websites, trade magazines, etc.
Entries will be made in the portfolio on a weekly basis at a minimum.
You are required to submit your portfolio entries in weeks 3, 6, 9 and 12 for assessment (4 submissions @ 5 marks each for a total of 20 marks). It is important to maintain this document throughout the term as it is the only component of the unit assessed individually.
Failure to submit a portfolio will disadvantage your overall marks.
The unit website provides further information and specific marking criteria.
- Apply the concepts taught in network security specialisation units informed by research and professional best-practice.
- Assess systems for weaknesses and select and implement appropriate counter measures and controls.
- Evaluate security protections and assess their level of compliance and effectiveness.
- Identify “client” or customer requirements and propose solutions.
- Organise, manage and prioritise tasks in order to address complex real world problems.
- Select and apply task-appropriate project management and solution development methodologies.
- Demonstrate productive participation and contribution to a project team or work environment.
- Knowledge
- Communication
- Cognitive, technical and creative skills
- Research
- Self-management
- Ethical and Professional Responsibility
- Leadership
3 Group Work
This assessment comprises two different parts:
1. Group progress reports
2. Draft Project Report – Group presentation
Please see complete details in the Moodle Site.
As per Schedule in the Moodle unit Website
Within two weeks of submission
Progress Reports (4@2% each) - 8%
Each progress report will contain a review of the project. Assessment will be on the completeness of the content of the report.
Presentation - 12%
Each group will be allocated a time in Week 11 to present a draft of their project report. Each presentation will be assessed on the following criteria:
Group marks will be based on:
Preparation and consistency of presentation
Set up and use of visual aids
Timing of presentation including Q&A
Continuity and flow from one presenter to the next Presentation content is relevant to the topic
Content is clear, concise and relevant
Response to questions during Q&A
Individual marks for presentation will be based on:
Appropriate dress
Presentation manner
Content is explained well
Please see unit website for more specific marking criteria.
- Apply the concepts taught in network security specialisation units informed by research and professional best-practice.
- Assess systems for weaknesses and select and implement appropriate counter measures and controls.
- Evaluate security protections and assess their level of compliance and effectiveness.
- Identify “client” or customer requirements and propose solutions.
- Organise, manage and prioritise tasks in order to address complex real world problems.
- Select and apply task-appropriate project management and solution development methodologies.
- Demonstrate productive participation and contribution to a project team or work environment.
- Knowledge
- Communication
- Cognitive, technical and creative skills
- Research
- Self-management
- Ethical and Professional Responsibility
- Leadership
As a CQUniversity student you are expected to act honestly in all aspects of your academic work.
Any assessable work undertaken or submitted for review or assessment must be your own work. Assessable work is any type of work you do to meet the assessment requirements in the unit, including draft work submitted for review and feedback and final work to be assessed.
When you use the ideas, words or data of others in your assessment, you must thoroughly and clearly acknowledge the source of this information by using the correct referencing style for your unit. Using others’ work without proper acknowledgement may be considered a form of intellectual dishonesty.
Participating honestly, respectfully, responsibly, and fairly in your university study ensures the CQUniversity qualification you earn will be valued as a true indication of your individual academic achievement and will continue to receive the respect and recognition it deserves.
As a student, you are responsible for reading and following CQUniversity’s policies, including the Student Academic Integrity Policy and Procedure. This policy sets out CQUniversity’s expectations of you to act with integrity, examples of academic integrity breaches to avoid, the processes used to address alleged breaches of academic integrity, and potential penalties.
What is a breach of academic integrity?
A breach of academic integrity includes but is not limited to plagiarism, self-plagiarism, collusion, cheating, contract cheating, and academic misconduct. The Student Academic Integrity Policy and Procedure defines what these terms mean and gives examples.
Why is academic integrity important?
A breach of academic integrity may result in one or more penalties, including suspension or even expulsion from the University. It can also have negative implications for student visas and future enrolment at CQUniversity or elsewhere. Students who engage in contract cheating also risk being blackmailed by contract cheating services.
Where can I get assistance?
For academic advice and guidance, the Academic Learning Centre (ALC) can support you in becoming confident in completing assessments with integrity and of high standard.