Networking and Security

Unit Outline (Higher Education)

   
?   Display Outline Guidelines      


Effective Term: 2026/05
Institute / School :Institute of Innovation, Science & Sustainability
Unit Title: Networking and Security
Unit ID: GPSIT1102
Credit Points: 15.00
Prerequisite(s): Nil
Co-requisite(s): Nil
Exclusion(s): Nil
ASCED: 020113
Other Change:  
Brief description of the Unit

This unit will introduce the fundamentals of networking through analysis of the Open System Interconnection (OSI) and Internet networking models. Students will learn the role of each model layer and the technologies used to provide end-to-end connectivity between computer systems and the associated networking protocols. The unit will also investigate the role of cybersecurity in securing information systems and the impacts of threats to individual persons and society, as well as ethical and legal considerations. The role of personnel and encryption in securing Internet communications will also be studied. This unit will incorporate additional learning hours to support the development of students’ academic and study skills.

Grade Scheme: Graded (HD, D, C, P, MF, F, XF)
Work Experience Indicator:
No work experience
Placement Component:
Supplementary Assessment:Yes
Where supplementary assessment is available a student must have failed overall in the Unit but gained a final mark of 45 per cent or above, has completed all major assessment tasks (including all sub-components where a task has multiple parts) as specified in the Unit Description and is not eligible for any other form of supplementary assessment
Course Level:
Level of Unit in CourseAQF Level(s) of Course
5678910
Introductory                                        
Intermediate                                                
Advanced                                                
Learning Outcomes:
Knowledge:
K1.

Describe and explain the role and functionality of hardware, software, and network connectivity in modern computing.

K2.

Describe and explain the principles, protocols, and interactions that enable communication in networked systems.

K3.

Describe and explain the role of information security in securing communication systems.

K4.

Explain the critical role of cyber security in securing communication systems in terms of impacts or threats to society and individuals, as well as ethical and legal considerations.

Skills:
S1.

Use and configure basic network services, tools, and settings on devices and operating systems.

S2.

Interpret security needs of information systems in various organisational contexts.

S3.

Develop the appropriate English language and academic skills to successfully study at an undergraduate level

Application of knowledge and skills:
A1.

Analyse the networking architecture needs of a business or an organisation.

A2.

Apply knowledge of security policies to reduce security threats.

A3.

Plan and implement operational assurance programs from a security perspective.

A4.

Analyse cryptographic techniques for data security.

Unit Content:

This may include:

  • Introduction to data communications networks, network models and protocol architecture.
  • IP addresses, subnet masks and the number systems used to describe them.
  • Fundamentals of architectures at the application layer, typical Internet-based applications.
  • Transmission media and their characteristics, guided and wireless media, media selection, digital and analog transmission of digital and analog data.
  • Functions of the data link layer, media access control, data link layer addressing, flow and error control mechanisms, and data link protocols.
  • Network layer protocols: Internet Protocol (IP), IP address assignment, address resolution, routing protocols, and multicasting.
  • Transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport layer functions, reliable and unreliable services, ports, linking to the application layer, segmentation, and session management.
  • Introduction to Local Area Networks (LAN), LAN components, Ethernet and Token Ring, LAN design considerations, Wireless LAN, Wide Area Networks (WAN).
  • Network and security in cloud computing.
  • Security requirements, including confidentiality, integrity and availability.
  • Security threats to Enterprise Networks.
  • Common security countermeasures.
  • Cryptography and other network security technologies.
  • Planning and Implementing a Corporate Security Policy.
  • Using operating systems and Industry standard networking and security tools, including virtualisation tools and protocol analysers.
  • IT and related industry activity and research developments in the local community, and around the globe; ACS’s CBOK, SFIA and their relationship with industry; Career pathways.
Graduate Attributes:
 Learning Outcomes AssessedAssessment TasksAssessment TypeWeighting
1.K1, K2, K3, K4, S1, S2, S3, A1, A2, A4

Tasks in which students apply networking concepts, security techniques, and related protocols to complete practical, hands-on activities.

Laboratory tasks

10-30%

2.K1, K2, K3, S1, S2, S3, A1, A3

Students apply their knowledge of networking protocols and security techniques, to develop solutions to practical networking and security problems

Assignment(s)

30-50%

3.K3, K4, S2, S3, A2

Students present on applying security policies to reduce threats, the role of cybersecurity in securing communication systems, and the organisational, societal, ethical, and legal implications.

Presentation(s)

20-30%

Adopted Reference Style:
APA  ()

Professional Standards / Competencies:
 Standard / Competency