Aim of Module | To provide students with the knowledge and skills required to apply or improve security measures related to the use of computers and networks |
Credits | 7 |
Student Learning hours | 70 |
Content Revised | New 2004 |
Prescription Expiry Date | Nov 2007 |
Topics | Highest Skill Level | Suggested Assessment Percentage | |
1 Security vulnerabilities, threats and appropriate counter measures | A | 30 | |
2 Encryption technologies and wireless security | C | 30 | |
3 Operational Security and disaster recovery | A | 40 | |
100 |
LEARNING OUTCOMES The Student Will | ||
A | 1 | Establish appropriate measures to ensure that security vulnerabilities, threats and appropriate countermeasures are identified and implemented |
C | 2 | Explain the purpose and application of encryption technologies and wireless security |
A | 3 | Implement appropriate operational security and disaster recovery procedures to ensure business continuity |
1 | Security vulnerabilities, threats and appropriate counter measures |
> | Securing assets. | |
> | Assessing security threats and vulnerabilities, including the use of security tools, security updates and logs. | |
> | Establishing, monitoring and maintaining secure baselines. | |
> | Managing access and authentication. | |
2 | Encryption technologies and wireless security |
> | Symmetric encryption and hash functions. | |
> | Public key encryption, certificates and related infrastructure. | |
> | Security in wireless networking. | |
3 | Operational Security and disaster recovery |
> | Securing internet traffic, including web content and email. | |
> | Securing web, mail, DNS and RAS servers. | |
> | Applying security policies. | |
> | Implementing disaster recovery measures such as a disaster recovery plan, backing up and restoring data. | |
Note | ||
> | Any appropriate server and client operating systems or combination of server and client operating systems can be used. |