| Effective Term: | 2026/05 |
| Institute / School : | Institute of Innovation, Science & Sustainability |
| Unit Title: | Networking and Security |
| Unit ID: | GPSIT1102 |
| Credit Points: | 15.00 |
| Prerequisite(s): | Nil |
| Co-requisite(s): | Nil |
| Exclusion(s): | Nil |
| ASCED: | 020113 |
| Other Change: | |
| Brief description of the Unit |
This unit will introduce the fundamentals of networking through analysis of the Open System Interconnection (OSI) and Internet networking models. Students will learn the role of each model layer and the technologies used to provide end-to-end connectivity between computer systems and the associated networking protocols. The unit will also investigate the role of cybersecurity in securing information systems and the impacts of threats to individual persons and society, as well as ethical and legal considerations. The role of personnel and encryption in securing Internet communications will also be studied. This unit will incorporate additional learning hours to support the development of students’ academic and study skills. |
| Grade Scheme: | Graded (HD, D, C, P, MF, F, XF) |
| Work Experience Indicator: |
| No work experience |
| Placement Component: | |
| Supplementary Assessment:Yes |
| Where supplementary assessment is available a student must have failed overall in the Unit but gained a final mark of 45 per cent or above, has completed all major assessment tasks (including all sub-components where a task has multiple parts) as specified in the Unit Description and is not eligible for any other form of supplementary assessment |
| Course Level: |
| Level of Unit in Course | AQF Level(s) of Course | | 5 | 6 | 7 | 8 | 9 | 10 | | Introductory |  | | | | | | | Intermediate | | | | | | | | Advanced | | | | | | |
|
| Learning Outcomes: |
| Knowledge: |
| K1. | Describe and explain the role and functionality of hardware, software, and network connectivity in modern computing. |
|
| K2. | Describe and explain the principles, protocols, and interactions that enable communication in networked systems. |
|
| K3. | Describe and explain the role of information security in securing communication systems. |
|
| K4. | Explain the critical role of cyber security in securing communication systems in terms of impacts or threats to society and individuals, as well as ethical and legal considerations. |
|
| Skills: |
| S1. | Use and configure basic network services, tools, and settings on devices and operating systems. |
|
| S2. | Interpret security needs of information systems in various organisational contexts. |
|
| S3. | Develop the appropriate English language and academic skills to successfully study at an undergraduate level |
|
| Application of knowledge and skills: |
| A1. | Analyse the networking architecture needs of a business or an organisation. |
|
| A2. | Apply knowledge of security policies to reduce security threats. |
|
| A3. | Plan and implement operational assurance programs from a security perspective. |
|
| A4. | Analyse cryptographic techniques for data security. |
|
| Unit Content: |
This may include: - Introduction to data communications networks, network models and protocol architecture.
- IP addresses, subnet masks and the number systems used to describe them.
- Fundamentals of architectures at the application layer, typical Internet-based applications.
- Transmission media and their characteristics, guided and wireless media, media selection, digital and analog transmission of digital and analog data.
- Functions of the data link layer, media access control, data link layer addressing, flow and error control mechanisms, and data link protocols.
- Network layer protocols: Internet Protocol (IP), IP address assignment, address resolution, routing protocols, and multicasting.
- Transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport layer functions, reliable and unreliable services, ports, linking to the application layer, segmentation, and session management.
- Introduction to Local Area Networks (LAN), LAN components, Ethernet and Token Ring, LAN design considerations, Wireless LAN, Wide Area Networks (WAN).
- Network and security in cloud computing.
- Security requirements, including confidentiality, integrity and availability.
- Security threats to Enterprise Networks.
- Common security countermeasures.
- Cryptography and other network security technologies.
- Planning and Implementing a Corporate Security Policy.
- Using operating systems and Industry standard networking and security tools, including virtualisation tools and protocol analysers.
- IT and related industry activity and research developments in the local community, and around the globe; ACS’s CBOK, SFIA and their relationship with industry; Career pathways.
|
| Graduate Attributes: |
| | Learning Outcomes Assessed | Assessment Tasks | Assessment Type | Weighting | | 1. | K1, K2, K3, K4, S1, S2, S3, A1, A2, A4 | Tasks in which students apply networking concepts, security techniques, and related protocols to complete practical, hands-on activities. | Laboratory tasks | 10-30% | | 2. | K1, K2, K3, S1, S2, S3, A1, A3 | Students apply their knowledge of networking protocols and security techniques, to develop solutions to practical networking and security problems | Assignment(s) | 30-50% | | 3. | K3, K4, S2, S3, A2 | Students present on applying security policies to reduce threats, the role of cybersecurity in securing communication systems, and the organisational, societal, ethical, and legal implications. | Presentation(s) | 20-30% |
|