| Aim of Module | To provide students with the knowledge and skills required to apply or improve security measures related to the use of computers and networks |
| Credits | 7 |
| Student Learning hours | 70 |
| Content Revised | New 2004 |
| Prescription Expiry Date | Nov 2007 |
| Topics | Highest Skill Level | Suggested Assessment Percentage | |
| 1 Security vulnerabilities, threats and appropriate counter measures | A | 30 | |
| 2 Encryption technologies and wireless security | C | 30 | |
| 3 Operational Security and disaster recovery | A | 40 | |
| 100 | |||
| LEARNING OUTCOMES The Student Will | ||
| A | 1 | Establish appropriate measures to ensure that security vulnerabilities, threats and appropriate countermeasures are identified and implemented |
| C | 2 | Explain the purpose and application of encryption technologies and wireless security |
| A | 3 | Implement appropriate operational security and disaster recovery procedures to ensure business continuity |
| 1 | Security vulnerabilities, threats and appropriate counter measures |
| > | Securing assets. | |
| > | Assessing security threats and vulnerabilities, including the use of security tools, security updates and logs. | |
| > | Establishing, monitoring and maintaining secure baselines. | |
| > | Managing access and authentication. | |
| 2 | Encryption technologies and wireless security |
| > | Symmetric encryption and hash functions. | |
| > | Public key encryption, certificates and related infrastructure. | |
| > | Security in wireless networking. | |
| 3 | Operational Security and disaster recovery |
| > | Securing internet traffic, including web content and email. | |
| > | Securing web, mail, DNS and RAS servers. | |
| > | Applying security policies. | |
| > | Implementing disaster recovery measures such as a disaster recovery plan, backing up and restoring data. | |
| Note | ||
| > | Any appropriate server and client operating systems or combination of server and client operating systems can be used. | |