Part A: Course Overview
Course Title: Security Testing
Credit Points: 12.00
Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE2547 |
City Campus |
Undergraduate |
171H School of Science |
Face-to-Face |
Sem 2 2021 |
INTE2547 |
City Campus |
Undergraduate |
175H Computing Technologies |
Face-to-Face |
Sem 2 2022, Sem 2 2023, Sem 2 2024 |
Course Coordinator: Dr. Maggie Liu
Course Coordinator Phone: by email
Course Coordinator Email: xiaoning.liu@rmit.edu.au
Course Coordinator Location: 014.11.026
Course Coordinator Availability: By appointment
Pre-requisite Courses and Assumed Knowledge and Capabilities
Enforced Pre-requisite courses
Successful completion of:
-
INTE2633/INTE2634/INTE2625 Introduction to Cyber Security (Course ID 054986)
OR - COSC2536/COSC2539 - Security in Computing and Information Technology (Course ID 045940)
AND
-
COSC2712/COSC2081/COSC1073 Programming 1 (Course ID 004065)
OR - COSC2803/COSC3056/COSC3057 Java Programming Studio (Course ID 054081)
Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.
For your information go to RMIT Course Requisites webpage.
If you have completed prior studies at RMIT or another institution that developed the skills and knowledge covered in the above course/s you may be eligible to apply for credit transfer.
Alternatively, if you have prior relevant work experience that developed the skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.
Please follow the link for further information on how to apply for credit for prior study or experience.
Course Description
The main objective of this course is for students to acquire the tools and techniques necessary to perform practical security testing in various areas. Students are provided with a range of practical exercises and tasks to reinforce their skills including: Monitoring Internet traffic, testing of secure applications, identification of vulnerabilities in networked and mobile/wireless applications. In addition, students will learn input validation techniques to minimise security risks, man-in-the-middle attack techniques to be able to build more secure networked applications, practical secure software testing techniques to be able to test applications for security bugs.
Objectives/Learning Outcomes/Capability Development
Program Learning Outcomes
This course contributes to the program learning outcomes for the following program(s):
BP355 - Bachelor of Cyber Security
BP356 - Bachelor of Cyber Security (Professional)
Major - Cyber Security
- BP094P23 - Bachelor of Computer Science
- BP340P23 - Bachelor of Data Science
- BP162O - Bachelor of Information Technology (RMITO)
- BP162P23 - Bachelor of Information Technology
- BP349 - Bachelor of Information Technology (Professional)
- BP347 - Bachelor of Computer Science (Professional)
- BP348 - Bachelor of Data Science (Professional)
PLO 1 Knowledge - Apply a broad and coherent set of knowledge and skills for developing data driven solutions for contemporary societal challenges.
PLO 2 Problem Solving - Apply systematic problem solving and decision making methodologies to identify, design and implement data driven solutions to real world problems, demonstrating the ability to work independently to self-manage processes and projects
PLO 4 Communication - Communicate effectively with diverse audiences, employing a range of communication methods in interactions.to both computing and non computing personnel.
For more information on the program learning outcomes for your program, please see the program guide.
On successful completion of this course you should be able to:
- Investigate methods that are appropriate for the realisation security testing in software, web, network and systems;
- Investigate and model the possible vulnerabilities and threats for a given application system;
- Design, implement test procedures and perform post-testing evaluation
- Analyse and evaluate security related scenarios
Overview of Learning Activities
The learning activities included in this course are one hour lectorial plus two hour lab-tute each week over 12 weeks:
- key concepts are given on Canvas; Lectorial enables Q&A and further discussions; tools and software used will be demonstrated in the lab-tute;
- labs focused on practice which allow exploration of security loopholes, and give feedback on your progress and understanding;
- assignments, as described in Overview of Assessment (below), requiring an integrated understanding of the subject matter; and private study, working through the course as presented in classes and learning materials, and gaining practice at solving conceptual and technical problems.
Overview of Learning Resources
You will make extensive use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through Canvas. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.
Use the RMIT Bookshop’s textbook list search page to find any recommended textbook(s).
Overview of Assessment
This course has no hurdle requirements.
Assessment Tasks:
Assessment Task 1: Assignment 1 - Network Security
Weighting 30%
This assessment task supports CLOs 1, 2 & 3
Assessment Task 2: Assignment 2 - Testing Techniques
Weighting 40%
This assessment task supports CLO 1, 3 & 4
Assessment Task 3: Assignment 3 - Presentation and Report
Weighting 30%
This assessment task supports CLO 2, 3 & 4
If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.