Security Operations

Unit Outline (Higher Education)

   
?   Display Outline Guidelines      


Effective Term: 2025/05
Institute / School :Institute of Innovation, Science & Sustainability
Unit Title: Security Operations
Unit ID: ITECH3504
Credit Points: 15.00
Prerequisite(s): (ITECH2505)
Co-requisite(s): Nil
Exclusion(s): Nil
ASCED: 020113
Other Change:  
Brief description of the Unit

This advanced unit delves deep into the dynamic world of Security Operations Centers (SOCs).  The students will explore advanced threat detection, incident response, security information and event management (SIEM), and security orchestration, automation, and response (SOAR) technologies.  Learn to analyze security data, hunt for threats, investigate incidents, and implement automated workflows to streamline security operations. Through hands-on labs, gain practical experience with leading tools and hone your analytical and problem-solving skills to become a valuable asset in any SOC environment.

Grade Scheme: Graded (HD, D, C, P, MF, F, XF)
Work Experience Indicator:
No work experience
Placement Component: No
Supplementary Assessment:Yes
Where supplementary assessment is available a student must have failed overall in the Unit but gained a final mark of 45 per cent or above, has completed all major assessment tasks (including all sub-components where a task has multiple parts) as specified in the Unit Description and is not eligible for any other form of supplementary assessment
Course Level:
Level of Unit in CourseAQF Level(s) of Course
5678910
Introductory                                                
Intermediate                                                
Advanced                                        
Learning Outcomes:
Knowledge:
K1.Analyze advanced threat detection methodologies that leverage network traffic analysis, endpoint data analysis, and user behavior analysis.
K2.Critically evaluate security incident response frameworks and best practices for effectively handling security incidents. 
K3.Evaluate and compare leading security operations solutions such as Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) based on their functionalities and organizational needs.
Skills:
S1.Develop security monitoring strategies using advanced threat detection techniques.
Application of knowledge and skills:
A1.Synthesize the unit concepts to create a secure, resilient operational framework for a mock organizational environment.
Unit Content:

Topics may include:
1. Introduction to Security Operations Centers (SOCs), Security Operations Life Cycle
2. Advanced Threat Detection Techniques (e.g., Network Traffic Analysis, Endpoint Data Analysis, User Behavior Analysis)
3. Security incident response frameworks, methodologies, best practices, process & procedure
4. Advanced Security Monitoring Strategies & Threat Hunting Concepts
5. Introduction to Security Orchestration, Automation, and Response (SOAR)
6. SOAR Workflows for Threat Detection & Incident Response
7. Integrating SIEM & SOAR for Enhanced Security Operations
8. Advanced SOAR Configuration & Optimization
9. Future Trends in Security Operations

Graduate Attributes:
Federation University recognises that students require key transferable employability skills to prepare them for their future workplace and society. FEDTASKS (Transferable Attributes Skills and Knowledge) provide a targeted focus on five key transferable Attributes, Skills, and Knowledge that are be embedded within curriculum, developed gradually towards successful measures and interlinked with cross-discipline and Co-operative Learning opportunities. One or more FEDTASK, transferable Attributes, Skills or Knowledge must be evident in the specified learning outcomes and assessment for each FedUni Unit, and all must be directly assessed in each Course.

FED TASK and descriptorDevelopment and acquisition of FEDTASKS in the Unit
Learning outcomes
(KSA)
Assessment task
(AT#)
FEDTASK 1
Interpersonal

Students will demonstrate the ability to effectively communicate, inter-act and work with others both individually and in groups. Students will be required to display skills in-person and/or online in:

•   Using effective verbal and non-verbal communication

•   Listening for meaning and influencing via active listening

•   Showing empathy for others

•   Negotiating and demonstrating conflict resolution skills

•   Working respectfully in cross-cultural and diverse teams.

A1AT4
FEDTASK 2
Leadership

Students will demonstrate the ability to apply professional skills and behaviours in leading others. Students will be required to display skills in:

•   Creating a collegial environment

•   Showing self -awareness and the ability to self-reflect

•   Inspiring and convincing others

•   Making informed decisions

•   Displaying initiative

A1AT4
FEDTASK 3
Critical Thinking and Creativity

Students will demonstrate an ability to work in complexity and ambiguity using the imagination to create new ideas. Students will be required to display skills in:

•   Reflecting critically

•   Evaluating ideas, concepts and information

•   Considering alternative perspectives to refine ideas

•   Challenging conventional thinking to clarify concepts

•   Forming creative solutions in problem solving.

K1-K3, S1-S2, A1AT1-AT4
FEDTASK 4
Digital Literacy

Students will demonstrate the ability to work fluently across a range of tools, platforms and applications to achieve a range of tasks. Students will be required to display skills in:

•   Finding, evaluating, managing, curating, organising and sharing digital information

•   Collating, managing, accessing and using digital data securely

•   Receiving and responding to messages in a range of digital media

•   Contributing actively to digital teams and working groups

•   Participating in and benefiting from digital learning opportunities.

S1-S2, A1AT3-AT4
FEDTASK 5
Sustainable and Ethical Mindset

Students will demonstrate the ability to consider and assess the consequences and impact of ideas and actions in enacting ethical and sustainable decisions. Students will be required to display skills in:

•   Making informed judgments that consider the impact of devising solutions in global economic environmental and societal contexts

•   Committing to social responsibility as a professional and a citizen

•   Evaluating ethical, socially responsible and/or sustainable challenges and generating and articulating responses

•   Embracing lifelong, life-wide and life-deep learning to be open to diverse others

•   Implementing required actions to foster sustainability in their professional and personal life.

A1AT4
 Learning Outcomes AssessedAssessment TasksAssessment TypeWeighting
1.

K1-K3

Weekly Quizzes: Short quizzes will assess students' understanding of key concepts.

Quiz

10%-30%

2.

S1-S2

Lab Reports: Lab reports will document hands-on exercises and analysis.

Lab Reports

15%-35%

3.

A1

Project proposal: Students are required to submit an initial project proposal.

Project proposal

10%-30%

4.

A1

Final Project: Students will design a SOAR workflow to automate a specific security incident response task and submit a report.

Final Project

20%-40%

Adopted Reference Style:
IEEE  

Professional Standards / Competencies:
 Standard / Competency
1.Australian Computer Society - Core Body of Knowledge: 2023 accreditation
AttributeAssessedLevel
Core ICT Knowledge
ICT Fundamentals
Computational thinking: situation analysis and modelling using a range of methods and patterns to frame it so a computer system could operate effectively within it YesIntroductory
Design thinking: methods and tools that are used for handling abstraction could vary a great deal with the branch of ICT, from circuit diagrams to data modelling tools to business process modelling YesIntermediate
ICT Infrastructure
Network and internetwork concepts and protocols, wireless and mobile computing, cloud and distributed systems YesIntroductory
Cyber Security
Nature of Cyber Security: forms of attack, prevention, detection, mitigation and repair YesAdvanced
Information assets to be secured (hardware, networks, software, data) and the different means of securing them, cryptography YesAdvanced
Human security roles and behaviours, rights and obligations (privacy) YesAdvanced
2.Skills Framework for the Information Age (SFIA): Version 8
AttributeAssessedLevel
Strategy and architecture
Strategy and planning
EMRG Emerging technology monitoring (Levels 4 - 6)

Identifying and assessing new and emerging technologies, products, services, methods and techniques.

Yes4
Security and privacy
SCTY Information security (Levels 3 - 7)

Defining and operating a framework of security controls and security management strategies.

Yes4
INAS Information assurance (Levels 3 - 7)

Protecting against and managing risks related to the use, storage and transmission of data and information systems.

Yes5
VURE Vulnerability research (Levels 3 - 6)

Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and weaknesses.

Yes4
THIN Threat intelligence (Levels 2 - 6)

Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation.

Yes6
Advice and guidance
CNSL Consultancy (Levels 4 - 7)

Providing advice and recommendations, based on expertise and experience, to address client needs.

Yes4
Delivery and operation
Security services
SCAD Security operations (Levels 1 - 6)

Delivering management, technical and administrative services to implement security controls and security management strategies.

Yes6