Cyber-Security - ZEIT8104

Faculty: UNSW Canberra at ADFA

School: School of Engineering & Information Technology @ UNSW Canberra at ADFA

Course Outline:

Campus: UNSW Canberra at ADFA

Career: Postgraduate

Units of Credit: 6

EFTSL: 0.12500 (more info)

Indicative Contact Hours per Week: 3

Enrolment Requirements:

Restricted to students enrolled in Graduate Diploma or Masters programs.

CSS Contribution Charge: 2 (more info)

Tuition Fee: See Tuition Fee Schedule

Further Information: See Class Timetable

View course information for previous years.


This course aims to provide a solid understanding of the theory and practice used to manage information security on computer systems and networks. In more detail, topics include: an overview of computer and communications security, risk assessment, human factors, identification and authentication, access controls, malicious software, software security, O/S security, trusted computer systems, network attacks and defences, firewalls, intrusion detection and prevention, database security, legal and ethical issues.

Learning Outcomes

1. Have a broad understanding of the theory and
practice used to maintain security on computer
systems and networks; of the need for risk
assessment and security management; of the
technological bases for secure systems; and of issues
in system and network security.
2. Be able to perform a simple risk assessment for
some organisation; utilise some of the approaches to
securing computer software and systems; to perform
simple reviews of network security, and to select and
design an appropriate firewall configuration.
3. Appreciate that people are always a key security
issue; and understand some of the relevant
personnel, legal and ethical issues raised.

Delivery Mode

Distance and Intensive Distance Mode


  • Introduction to Cyber Security
  • Security Risk Analysis and Response
  • Human Factors
  • User Authentication and Access Control
  • Malicious Software
  • Software Security and Buffer Overflow
  • Operating Systems Security
  • Trusted Computer Systems
  • Network Attacks and Firewalls
  • Intrusion Detection and Prevention
  • Database Security
  • Legal and Ethical Issues


Practical Assignments 50%
Reading Project 25%
Take home Examination 25%

Course Texts/Software

Prescribed texts:
William Stallings, Lawrie Brown, "Computer
Security: Principles and Practice", 2/e, Pearson /
Prentice Hall 2012. Support material is available:

Recommended Texts:



Resources for this course are primarily provided to you
electronically through the UNSW Moodle server and
associated course resource disk image, and include:
• lecture notes and slides
• audio recordings of lectures past & current
• assessment details and instructions
• useful program links for you to install and use
• additional background resource material
• links to web and other resources
• model answers for exercises and projects.
Aerial View

Study Levels

UNSW Quick Links