Effective Term: | 2025/05 |
Institute / School : | Institute of Innovation, Science & Sustainability |
Unit Title: | Security Operations |
Unit ID: | ITECH3504 |
Credit Points: | 15.00 |
Prerequisite(s): | (ITECH2505) |
Co-requisite(s): | Nil |
Exclusion(s): | Nil |
ASCED: | 020113 |
Other Change: | |
Brief description of the Unit |
This advanced unit delves deep into the dynamic world of Security Operations Centers (SOCs). The students will explore advanced threat detection, incident response, security information and event management (SIEM), and security orchestration, automation, and response (SOAR) technologies. Learn to analyze security data, hunt for threats, investigate incidents, and implement automated workflows to streamline security operations. Through hands-on labs, gain practical experience with leading tools and hone your analytical and problem-solving skills to become a valuable asset in any SOC environment. |
Grade Scheme: | Graded (HD, D, C, P, MF, F, XF) |
Work Experience Indicator: |
No work experience |
Placement Component: No |
Supplementary Assessment:Yes |
Where supplementary assessment is available a student must have failed overall in the Unit but gained a final mark of 45 per cent or above, has completed all major assessment tasks (including all sub-components where a task has multiple parts) as specified in the Unit Description and is not eligible for any other form of supplementary assessment |
Course Level: |
Level of Unit in Course | AQF Level(s) of Course | 5 | 6 | 7 | 8 | 9 | 10 | Introductory | | | | | | | Intermediate | | | | | | | Advanced | | |  | | | |
|
Learning Outcomes: |
Knowledge: |
K1. | Analyze advanced threat detection methodologies that leverage network traffic analysis, endpoint data analysis, and user behavior analysis. |
|
K2. | Critically evaluate security incident response frameworks and best practices for effectively handling security incidents. |
|
K3. | Evaluate and compare leading security operations solutions such as Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) based on their functionalities and organizational needs. |
|
Skills: |
S1. | Develop security monitoring strategies using advanced threat detection techniques. |
|
Application of knowledge and skills: |
A1. | Synthesize the unit concepts to create a secure, resilient operational framework for a mock organizational environment. |
|
Unit Content: |
Topics may include: 1. Introduction to Security Operations Centers (SOCs), Security Operations Life Cycle 2. Advanced Threat Detection Techniques (e.g., Network Traffic Analysis, Endpoint Data Analysis, User Behavior Analysis) 3. Security incident response frameworks, methodologies, best practices, process & procedure 4. Advanced Security Monitoring Strategies & Threat Hunting Concepts 5. Introduction to Security Orchestration, Automation, and Response (SOAR) 6. SOAR Workflows for Threat Detection & Incident Response 7. Integrating SIEM & SOAR for Enhanced Security Operations 8. Advanced SOAR Configuration & Optimization 9. Future Trends in Security Operations |
Graduate Attributes: |
Federation University recognises that students require key transferable employability skills to prepare them for their future workplace and society. FEDTASKS (Transferable Attributes Skills and Knowledge) provide a targeted focus on five key transferable Attributes, Skills, and Knowledge that are be embedded within curriculum, developed gradually towards successful measures and interlinked with cross-discipline and Co-operative Learning opportunities. One or more FEDTASK, transferable Attributes, Skills or Knowledge must be evident in the specified learning outcomes and assessment for each FedUni Unit, and all must be directly assessed in each Course.
|
FED TASK and descriptor | Development and acquisition of FEDTASKS in the Unit | Learning outcomes (KSA) | Assessment task (AT#) | FEDTASK 1 Interpersonal | Students will demonstrate the ability to effectively communicate, inter-act and work with others both individually and in groups. Students will be required to display skills in-person and/or online in: • Using effective verbal and non-verbal communication • Listening for meaning and influencing via active listening • Showing empathy for others • Negotiating and demonstrating conflict resolution skills • Working respectfully in cross-cultural and diverse teams. | A1 | AT4 | FEDTASK 2 Leadership | Students will demonstrate the ability to apply professional skills and behaviours in leading others. Students will be required to display skills in: • Creating a collegial environment • Showing self -awareness and the ability to self-reflect • Inspiring and convincing others • Making informed decisions • Displaying initiative | A1 | AT4 | FEDTASK 3 Critical Thinking and Creativity | Students will demonstrate an ability to work in complexity and ambiguity using the imagination to create new ideas. Students will be required to display skills in: • Reflecting critically • Evaluating ideas, concepts and information • Considering alternative perspectives to refine ideas • Challenging conventional thinking to clarify concepts • Forming creative solutions in problem solving. | K1-K3, S1-S2, A1 | AT1-AT4 | FEDTASK 4 Digital Literacy | Students will demonstrate the ability to work fluently across a range of tools, platforms and applications to achieve a range of tasks. Students will be required to display skills in: • Finding, evaluating, managing, curating, organising and sharing digital information • Collating, managing, accessing and using digital data securely • Receiving and responding to messages in a range of digital media • Contributing actively to digital teams and working groups • Participating in and benefiting from digital learning opportunities. | S1-S2, A1 | AT3-AT4 | FEDTASK 5 Sustainable and Ethical Mindset | Students will demonstrate the ability to consider and assess the consequences and impact of ideas and actions in enacting ethical and sustainable decisions. Students will be required to display skills in: • Making informed judgments that consider the impact of devising solutions in global economic environmental and societal contexts • Committing to social responsibility as a professional and a citizen • Evaluating ethical, socially responsible and/or sustainable challenges and generating and articulating responses • Embracing lifelong, life-wide and life-deep learning to be open to diverse others • Implementing required actions to foster sustainability in their professional and personal life. | A1 | AT4 |
|
| Learning Outcomes Assessed | Assessment Tasks | Assessment Type | Weighting | 1. | K1-K3 | Weekly Quizzes: Short quizzes will assess students' understanding of key concepts. | Quiz | 10%-30% | 2. | S1-S2 | Lab Reports: Lab reports will document hands-on exercises and analysis. | Lab Reports | 15%-35% | 3. | A1 | Project proposal: Students are required to submit an initial project proposal. | Project proposal | 10%-30% | 4. | A1 | Final Project: Students will design a SOAR workflow to automate a specific security incident response task and submit a report. | Final Project | 20%-40% |
|
Professional Standards / Competencies: |
| Standard / Competency | 1. | Australian Computer Society - Core Body of Knowledge: 2023 accreditation |
|
Attribute | Assessed | Level | Core ICT Knowledge | |
ICT Fundamentals
| | |
Computational thinking: situation analysis and modelling using a range of methods and patterns to frame it so a computer system could operate effectively within it
| | Yes | Introductory | | |
Design thinking: methods and tools that are used for handling abstraction could vary a great deal with the branch of ICT, from circuit diagrams to data modelling tools to business process modelling
| | Yes | Intermediate | |
ICT Infrastructure
| | |
Network and internetwork concepts and protocols, wireless and mobile computing, cloud and distributed systems
| | Yes | Introductory | |
Cyber Security
| | |
Nature of Cyber Security: forms of attack, prevention, detection, mitigation and repair
| | Yes | Advanced | | |
Information assets to be secured (hardware, networks, software, data) and the different means of securing them, cryptography
| | Yes | Advanced | | |
Human security roles and behaviours, rights and obligations (privacy)
| | Yes | Advanced |
| 2. | Skills Framework for the Information Age (SFIA): Version 8 |
|
Attribute | Assessed | Level | Strategy and architecture | | Strategy and planning | | | EMRG Emerging technology monitoring (Levels 4 - 6) Identifying and assessing new and emerging technologies, products, services, methods and techniques. | | Yes | 4 | | Security and privacy | | | SCTY Information security (Levels 3 - 7) Defining and operating a framework of security controls and security management strategies. | | Yes | 4 | | | INAS Information assurance (Levels 3 - 7) Protecting against and managing risks related to the use, storage and transmission of data and information systems. | | Yes | 5 | | | VURE Vulnerability research (Levels 3 - 6) Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and weaknesses. | | Yes | 4 | | | THIN Threat intelligence (Levels 2 - 6) Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation. | | Yes | 6 | | Advice and guidance | | | CNSL Consultancy (Levels 4 - 7) Providing advice and recommendations, based on expertise and experience, to address client needs. | | Yes | 4 | Delivery and operation | | Security services | | | SCAD Security operations (Levels 1 - 6) Delivering management, technical and administrative services to implement security controls and security management strategies. | | Yes | 6 |
|
|