The MBC information booklet - RMIT University
The MBC information booklet - RMIT University The MBC information booklet - RMIT University
Chapter 4: Bioinformatics 24
CHAPTER 5 Computer Security 5.1 Introduction 5.2 Courses 5.2.1 COSC2302— Computer and Internet Forensics Chapter 5: Computer Security Computer security is one of the fastest-growing areas of the IT industry worldwide. There is a shortage of expertise in this area, with openings and salaries for computer security specialists increasing quickly. Students choosing to specialise in the computer security cluster will gain valuable understanding of security threats and vulnerabilities, the skills to prevent and address problems, and the capability to appropriately investigate computer security incidents. COSC2302 Computer & Internet Forensics explores issues related to security of computer systems, accessing and analysing data, reconstructing events, surveillance, intrusion prevention, intrusion detection, and recovery from breaches. COSC2304 Mobile & Wireless Computing introduces a variety of data communicating methods and protocols in wireless and mobile environments. Students learn to employ application frameworks for developing mobile applications, create web sites suitable for mobile environments, and select components and networks for particular applications. In COSC2107 Network Security, students will gain advanced knowledge in computer network security, which is becoming one of the most pressing problems in computing. Topics include: threats and attacks; system security; network security; application security; port security; data security; and security management. INTE1070 Secure Electronic Commerce covers security issues in e-commerce, focusing on the principles and concepts related to computer-based, electronic transactions. Pursuant to demand, the following courses on offer are: • COSC2302—Computer and Internet Forensics (see page 25) • INTE1125—Cryptography and Security (see page 26) • COSC2304—Mobile and Wireless Computing (see page 26) • COSC2107—Network Security (see page 26) • INTE1070—Secure Electronic Commerce (see page 26) • INTE2401—Secure Programming Environments (see page 27) Note: This is a Masters-level course. Course Description This course introduces students to the principles and practice of computer and internet forensics. Students will explore issues related to security of computer systems, accessing and analyzing data, reconstructing events, surveillance, intrusion prevention, intrusion detection, and recovery from breaches. This course is particularly aimed at students who have a strong interest in computer and information security. Pre-requisite Courses and Assumed Knowledge and Capabilities • INTE1070 Secure Electronic Commerce or equivalent (For information on equivalence go to http://www.cs.rmit.edu.au/courseguides/ equivalents.shtml.) For more information on the course, go to www.rmit.edu.au/courses2006/036671. 25
- Page 3 and 4: INFORMATION BOOKLET For Local and I
- Page 5 and 6: CHAPTER 1 INTRODUCTION 1.1 Terminol
- Page 7 and 8: CHAPTER 8 SEARCH ENGINES 8.1 Introd
- Page 9 and 10: 14.4 After-Hours Access ...........
- Page 11 and 12: 14.31 Homepage ....................
- Page 13: 14.62 Transfer.....................
- Page 16 and 17: Chapter 1: Introduction 2 Students
- Page 18 and 19: Chapter 1: Introduction 1.6.4 Summe
- Page 20 and 21: Chapter 1: Introduction 1.14 Academ
- Page 22 and 23: Chapter 1: Introduction 8
- Page 24 and 25: Chapter 2: Masters Program Format a
- Page 26 and 27: Chapter 2: Masters Program Format a
- Page 28 and 29: Chapter 2: Masters Program Format a
- Page 30 and 31: Chapter 2: Masters Program Format a
- Page 32 and 33: Chapter 3: Advanced Databases 3.2 C
- Page 34 and 35: Chapter 3: Advanced Databases 3.2.4
- Page 36 and 37: Chapter 4: Bioinformatics 4.2.2 MAT
- Page 40 and 41: Chapter 5: Computer Security 5.2.2
- Page 42 and 43: Chapter 5: Computer Security 28
- Page 44 and 45: Chapter 6: Intelligent Systems 6.2
- Page 46 and 47: Chapter 6: Intelligent Systems 32
- Page 48 and 49: Chapter 7: Networked & Distributed
- Page 50 and 51: Chapter 7: Networked & Distributed
- Page 52 and 53: Chapter 8: Search Engines 8.2.3 COS
- Page 54 and 55: Chapter 9: Software Engineering 9.1
- Page 56 and 57: Chapter 9: Software Engineering 42
- Page 58 and 59: Chapter 10: Web-based Computing 10.
- Page 60 and 61: Chapter 11: Minor Thesis/Project 11
- Page 62 and 63: Chapter 11: Minor Thesis/Project 48
- Page 64 and 65: Chapter 11: Minor Thesis/Project 11
- Page 66 and 67: Chapter 11: Minor Thesis/Project 11
- Page 68 and 69: Chapter 11: Minor Thesis/Project 54
- Page 70 and 71: Chapter 11: Minor Thesis/Project 56
- Page 72 and 73: Chapter 11: Minor Thesis/Project 58
- Page 74 and 75: Chapter 12: Vocational Electives 12
- Page 76 and 77: Chapter 12: Vocational Electives 12
- Page 78 and 79: Chapter 12: Vocational Electives 12
- Page 80 and 81: Chapter 12: Vocational Electives 12
- Page 82 and 83: Chapter 12: Vocational Electives 68
- Page 84 and 85: Chapter 13: Master of Applied Scien
- Page 86 and 87: Chapter 14: Frequently asked questi
CHAPTER 5 Computer Security<br />
5.1 Introduction<br />
5.2 Courses<br />
5.2.1 COSC2302—<br />
Computer and<br />
Internet<br />
Forensics<br />
Chapter 5: Computer Security<br />
Computer security is one of the fastest-growing areas of the IT industry worldwide. <strong>The</strong>re<br />
is a shortage of expertise in this area, with openings and salaries for computer security<br />
specialists increasing quickly.<br />
Students choosing to specialise in the computer security cluster will gain valuable<br />
understanding of security threats and vulnerabilities, the skills to prevent and address<br />
problems, and the capability to appropriately investigate computer security incidents.<br />
COSC2302 Computer & Internet Forensics explores issues related to security of computer<br />
systems, accessing and analysing data, reconstructing events, surveillance, intrusion<br />
prevention, intrusion detection, and recovery from breaches.<br />
COSC2304 Mobile & Wireless Computing introduces a variety of data communicating<br />
methods and protocols in wireless and mobile environments. Students learn to employ<br />
application frameworks for developing mobile applications, create web sites suitable for<br />
mobile environments, and select components and networks for particular applications.<br />
In COSC2107 Network Security, students will gain advanced knowledge in computer<br />
network security, which is becoming one of the most pressing problems in computing.<br />
Topics include: threats and attacks; system security; network security; application security;<br />
port security; data security; and security management.<br />
INTE1070 Secure Electronic Commerce covers security issues in e-commerce, focusing<br />
on the principles and concepts related to computer-based, electronic transactions.<br />
Pursuant to demand, the following courses on offer are:<br />
• COSC2302—Computer and Internet Forensics (see page 25)<br />
• INTE1125—Cryptography and Security (see page 26)<br />
• COSC2304—Mobile and Wireless Computing (see page 26)<br />
• COSC2107—Network Security (see page 26)<br />
• INTE1070—Secure Electronic Commerce (see page 26)<br />
• INTE2401—Secure Programming Environments (see page 27)<br />
Note: This is a Masters-level course.<br />
Course Description<br />
This course introduces students to the principles and practice of computer and internet<br />
forensics. Students will explore issues related to security of computer systems, accessing<br />
and analyzing data, reconstructing events, surveillance, intrusion prevention, intrusion<br />
detection, and recovery from breaches. This course is particularly aimed at students who<br />
have a strong interest in computer and <strong>information</strong> security.<br />
Pre-requisite Courses and Assumed Knowledge and Capabilities<br />
• INTE1070 Secure Electronic Commerce or equivalent<br />
(For <strong>information</strong> on equivalence go to http://www.cs.rmit.edu.au/courseguides/<br />
equivalents.shtml.)<br />
For more <strong>information</strong> on the course, go to www.rmit.edu.au/courses2006/036671.<br />
25