Cybersecurity Fundamentals

Unit Outline (Higher Education)

   
?   Display Outline Guidelines      


Effective Term: 2025/05
Institute / School :Institute of Innovation, Science & Sustainability
Unit Title: Cybersecurity Fundamentals
Unit ID: ITECH1502
Credit Points: 15.00
Prerequisite(s): Nil
Co-requisite(s): Nil
Exclusion(s): (GPSIT1102 and ITECH1102)
ASCED: 020113
Other Change:  
Brief description of the Unit

This unit introduces students to the foundational concepts and practices in cybersecurity. It emphasizes the understanding and application of core principles in securing systems and networks against threats. The unit prepares students for further studies in cybersecurity, and is tailored to those new to the field, focusing on building a solid theoretical and practical foundation.

Grade Scheme: Graded (HD, D, C, P, MF, F, XF)
Work Experience Indicator:
No work experience
Placement Component: No
Supplementary Assessment:
Where supplementary assessment is available a student must have failed overall in the Unit but gained a final mark of 45 per cent or above, has completed all major assessment tasks (including all sub-components where a task has multiple parts) as specified in the Unit Description and is not eligible for any other form of supplementary assessment
Course Level:
Level of Unit in CourseAQF Level(s) of Course
5678910
Introductory                                        
Intermediate                                                
Advanced                                                
Learning Outcomes:

After successfully completing this unit, students should be able to:

Knowledge:
K1.Describe the basic concepts and terminology of cybersecurity.
K2.Identify common cybersecurity threats and vulnerabilities.
K3.Explain the function and purpose of various security technologies and practices.
K4.Recognize legal and ethical issues in the context of cybersecurity.
Skills:
S1.Assess risks associated with cybersecurity in personal and organizational contexts.
S2.Apply basic security measures to protect systems and data.
S3.Utilize tools for vulnerability scanning and basic penetration testing.
S4.Implement simple security protocols on personal and small-scale networks.
Application of knowledge and skills:
A1.Apply cybersecurity measures to real-world scenarios.
A2.Analyze case studies to identify security breaches and suggest mitigation strategies.
Unit Content:

Topics may include:
1. Understanding Cyber Threats, Vulnerabilities, and Attacks.
2. Basic Cryptography: Concepts, Tools, and Techniques.
3. Implementing Network Security: Firewalls, VPNs, and Wireless Security.
4. Practical Security: Securing Devices and Using Security Software.
5. Legal, Privacy, and Ethical Issues in Cybersecurity.
6. Incident Response and Basic Forensic Techniques.
7. Introduction to Security in Emerging Technologies: IoT and Cloud Security and software security.
8.
Introduction to Local Area Networks (LAN), LAN components, Ethernet and Token Ring, LAN design consideration, Wireless LAN, Wide Area Networks (WAN).

9.
Security requirments, including confidentiality, integrity and availability.

10.
Security threats to Enterprise Networks.

Graduate Attributes:
Federation University recognises that students require key transferable employability skills to prepare them for their future workplace and society. FEDTASKS (Transferable Attributes Skills and Knowledge) provide a targeted focus on five key transferable Attributes, Skills, and Knowledge that are be embedded within curriculum, developed gradually towards successful measures and interlinked with cross-discipline and Co-operative Learning opportunities. One or more FEDTASK, transferable Attributes, Skills or Knowledge must be evident in the specified learning outcomes and assessment for each FedUni Unit, and all must be directly assessed in each Course.

FED TASK and descriptorDevelopment and acquisition of FEDTASKS in the Unit
Learning outcomes
(KSA)
Assessment task
(AT#)
FEDTASK 1
Interpersonal

Students will demonstrate the ability to effectively communicate, inter-act and work with others both individually and in groups. Students will be required to display skills in-person and/or online in:

•   Using effective verbal and non-verbal communication

•   Listening for meaning and influencing via active listening

•   Showing empathy for others

•   Negotiating and demonstrating conflict resolution skills

•   Working respectfully in cross-cultural and diverse teams.

K3, K4AT1, AT2, AT3
FEDTASK 2
Leadership

Students will demonstrate the ability to apply professional skills and behaviours in leading others. Students will be required to display skills in:

•   Creating a collegial environment

•   Showing self -awareness and the ability to self-reflect

•   Inspiring and convincing others

•   Making informed decisions

•   Displaying initiative

Not applicableNot applicable
FEDTASK 3
Critical Thinking and Creativity

Students will demonstrate an ability to work in complexity and ambiguity using the imagination to create new ideas. Students will be required to display skills in:

•   Reflecting critically

•   Evaluating ideas, concepts and information

•   Considering alternative perspectives to refine ideas

•   Challenging conventional thinking to clarify concepts

•   Forming creative solutions in problem solving.

K1, K2, K3, K2, S3, S4AT1, AT2, AT3
FEDTASK 4
Digital Literacy

Students will demonstrate the ability to work fluently across a range of tools, platforms and applications to achieve a range of tasks. Students will be required to display skills in:

•   Finding, evaluating, managing, curating, organising and sharing digital information

•   Collating, managing, accessing and using digital data securely

•   Receiving and responding to messages in a range of digital media

•   Contributing actively to digital teams and working groups

•   Participating in and benefiting from digital learning opportunities.

K4, S1, A2AT1, AT2, AT3
FEDTASK 5
Sustainable and Ethical Mindset

Students will demonstrate the ability to consider and assess the consequences and impact of ideas and actions in enacting ethical and sustainable decisions. Students will be required to display skills in:

•   Making informed judgments that consider the impact of devising solutions in global economic environmental and societal contexts

•   Committing to social responsibility as a professional and a citizen

•   Evaluating ethical, socially responsible and/or sustainable challenges and generating and articulating responses

•   Embracing lifelong, life-wide and life-deep learning to be open to diverse others

•   Implementing required actions to foster sustainability in their professional and personal life.

S1AT1, AT2, AT3
 Learning Outcomes AssessedAssessment TasksAssessment TypeWeighting
1.K1 – K4, S1 – S4, A1 - A2Students will be tested on their theoretical and knowledge and apply their understanding to practical cybersecurity scenarios.Assignments and laboratory tasks20% - 30%
2.K1, K2, K4, S1, S2, S3, A1, A2Students will create an artefact that proposes a solution to an authentic cybersecurity issue and present their findings.Assignment(s) and Presentation(s)30% - 50%
3.K1 – K4, S1, S2, A2Students will be tested on their conceptual understanding of essential terminology and concepts related to cybersecurityExamination(s)/Test(s)30% - 40%
Adopted Reference Style:
APA  

Professional Standards / Competencies:
 Standard / Competency
1.Australian Computer Society - Core Body of Knowledge: 2023 accreditation
AttributeAssessedLevel
Core ICT Knowledge
ICT Fundamentals
Computational thinking: situation analysis and modelling using a range of methods and patterns to frame it so a computer system could operate effectively within it YesIntroductory
History of computing and ICT, drivers of technology evolution and trends for the future YesIntroductory
ICT Infrastructure
Network and internetwork concepts and protocols, wireless and mobile computing, cloud and distributed systems YesIntermediate
Systems software and operating systems managing the architecture YesIntroductory
Cyber Security
Nature of Cyber Security: forms of attack, prevention, detection, mitigation and repair YesIntroductory
Information assets to be secured (hardware, networks, software, data) and the different means of securing them, cryptography YesIntroductory
Professionalism as it applied in ICT
Professional ICT Ethics
Professional ethics issues: general professional issues such as conflict of interest, confidentiality YesIntroductory
ICT specific ethics issues: adverse stakeholder impacts of ICT, surveillance and privacy, data matching, autonomous computing, digital divide, etc. YesIntroductory
Impacts of ICT
Impacts of ICT on society (cyber warfare; surveillance, privacy and civil liberties, cybercrime and hacking, digital divide, technology reliance, intellectual property and legal issues) YesIntroductory
Professional Communication
Forms and styles of documentation - technical reports and specifications, progress reports YesIntroductory
The Professional ICT Practitioner
Continuing professional development, career upskilling, networking NoIntroductory
2.Skills Framework for the Information Age (SFIA): Version 8
AttributeAssessedLevel
Strategy and architecture
Strategy and planning
ITSP Strategic planning (Levels 5 - 7)

Creating and maintaining a strategy to align organisational actions, plans and resources with business objectives.

No1
MEAS Measurement (Levels 3 - 6)

Developing and operating a measurement capability to support agreed organisational information needs.

Yes1
Security and privacy
INAS Information assurance (Levels 3 - 7)

Protecting against and managing risks related to the use, storage and transmission of data and information systems.

Yes1
Development and implementation
Systems development
NTDS Network design (Levels 3 - 6)

Designing communication networks to support strategic and operational requirements and producing network strategies, architectures, policies and related documentation.

Yes2
Delivery and operation
Technology management
ITOP IT infrastructure (Levels 1 - 5)

Deploying, configuring and operating IT Infrastructure.

Yes1
NTAS Network support (Levels 2 - 5)

Providing maintenance and support services for communications networks.

Yes2
Security services
SCAD Security operations (Levels 1 - 6)

Delivering management, technical and administrative services to implement security controls and security management strategies.

Yes1
VUAS Vulnerability assessment (Levels 2 - 5)

Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact.

Yes2
DGFS Digital forensics (Levels 3 - 6)

Recovering and investigating material found in digital devices.

Yes2
PENT Penetration testing (Levels 3 - 6)

Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers.

Yes1
People and skills
People management
PDSV Professional development (Levels 4 - 6)

Facilitating the professional development of individuals in line with their career goals and organisational requirements.

Yes2