Networking and Security

Unit Outline (Higher Education)

   
?   Display Outline Guidelines      


Effective Term: 2024/05
Institute / School :Institute of Innovation, Science & Sustainability
Unit Title: Networking and Security
Unit ID: GPSIT1102
Credit Points: 15.00
Prerequisite(s): Nil
Co-requisite(s): Nil
Exclusion(s): Nil
ASCED: 020113
Other Change:  
Brief description of the Unit

This course will introduce the fundamentals of networking through analysis of the Open System Interconnection (OSI) and Internet networking models. Students will learn the role of each model layer and the technologies used to provide end-to-end connectivity between computer systems and the associated networking protocols. The course will also introduce cloud computing and investigate the role of cybersecurity in securing information systems. The role of personnel and encryption to secure Internet communications will also be studied. This course will incorporate additional learning hours to support the development of students’ academic and study skills.

Grade Scheme: Graded (HD, D, C, P, MF, F, XF)
Work Experience Indicator:
No work experience
Placement Component:
Supplementary Assessment:Yes
Where supplementary assessment is available a student must have failed overall in the Unit but gained a final mark of 45 per cent or above, has completed all major assessment tasks (including all sub-components where a task has multiple parts) as specified in the Unit Description and is not eligible for any other form of supplementary assessment
Course Level:
Level of Unit in CourseAQF Level(s) of Course
5678910
Introductory                                        
Intermediate                                                
Advanced                                                
Learning Outcomes:
Knowledge:
K1.

Describe and explain the role and function of network connectivity in current computing.

K2.

Describe and explain the principles of communication in networks.

K3.

Explain the role and functionality of hardware and software entities that contribute to network communications.

K4.

Explain the protocols and interactions that implement network communications.

K5.

Describe and explain the role of information security in securing communication systems.

K6.

Detail fundamental aspects of cloud computing.

Skills:
S1.

Proficiently use a variety of network services and tools.

S2.

Interpret security needs of information systems.

S3.

Examine and configure network settings on various network devices and operating systems.

S4.

Develop the appropriate English language and academic skills to successfully study at an undergraduate level

Application of knowledge and skills:
A1.

Apply networking architecture knowledge to analyze the networking needs for business.

A2.

Apply knowledge of security policies to reduce security threats.

A3.

Plan and implement operational assurance programs from a security perspective.

A4.

Analyse cryptographic techniques for data security.

Unit Content:

This may include:
•Introduction to data communications networks, network models and protocol architecture.
•IP addresses, subnet masks and the number systems used to describe them.
•Fundamentals of architectures at the application layer, common Internet based applications.
•Transmission media and their characteristics, guided and wireless media, media selection, digital and analog transmission of digital and analog data.
•Functions of data link layer, media access control, data link layer addressing, flow and error control mechanisms, data link protocols.
•Network layer protocols: Internet Protocol (IP), assigning IP addresses, address resolution, routing protocols, multicasting.
•Transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport layer functions, reliable and unreliable services, ports, linking to the application layer, segmentation, session management.
•Introduction to Local Area Networks (LAN), LAN components, Ethernet and Token Ring, LAN design consideration, Wireless LAN, Wide Area Networks (WAN).
•Cloud computing fundamentals, Cloud security models and the advantages and disadvantages of cloud computing.
•Security requirments, including confidentiality, integrity and availability.
•Security threats to Enterprise Networks.
•Common security countermeasures.
•Cryptography and other network security technologies.
•Planning and Implementing a Corporate Security Policy.
•Using operating system and Industry standard networking and security tools including Virtualization tools and protocol analysers.
•IT and related industry activity and research developments in the local community, and around the globe; ACS’s CBOK, SFIA and their relationship with industry; Career pathways.

Graduate Attributes:
 Learning Outcomes AssessedAssessment TasksAssessment TypeWeighting
1.

K1, K2, K3, K4, K5, K6, S1, S2, S3, S4, A1, A2, A3, A4.

Students will utilise their knowledge of networking protocols and security techniques to answer conceptual questions and apply their understanding to practical networking and security problems.

Assignments/laboratory tasks/presentations/quizzes.

30-50%

2.

K1, K2, K3, K4, K5, K6, S1, S2, S3, S4, A1, A2, A3, A4.

Students will provide theoretical answers and work out solutions to a range of questions and problems designed to test their understanding on networking concepts and protocols and security techniques.

Examination/Tests.

50-70%

Adopted Reference Style:
APA  ()

Professional Standards / Competencies:
 Standard / Competency