COMP SCI 3308 - Advanced Cyber Security: Techniques & Concepts
North Terrace Campus - Semester 1 - 2025
-
General Course Information
Course Details
Course Code COMP SCI 3308 Course Advanced Cyber Security: Techniques & Concepts Coordinating Unit Computer Science Term Semester 1 Level Undergraduate Location/s North Terrace Campus Units 3 Contact Up to 3 hours per week Available for Study Abroad and Exchange N Prerequisites One of COMP SCI 1103, COMP SCI 1203, COMP SCI 2009, COMP SCI 2103, COMP SCI 2202 or COMP SCI 2202B Assumed Knowledge COMP SCI 2005 Assessment Assignments, practicals, and exam Course Staff
Course Coordinator: Md Mokammel Haque
Course Timetable
The full timetable of all activities for this course can be accessed from .
-
Learning Outcomes
Course Learning Outcomes
On successful completion of this course students will be able to:
1 Describe career paths in cybersecurity and corresponding required skills, certifications and aptitudes. 2 Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing. 3 Describe the role of an information security in an organisation, and main components of information security management frameworks to effectively manage risks. 4 Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering. 5 Demonstrate the ability to reason about ethical concerns during cybersecurity-focused
activities.最新糖心Vlog Graduate Attributes
This course will provide students with an opportunity to develop the Graduate Attribute(s) specified below:
最新糖心Vlog Graduate Attribute Course Learning Outcome(s) Attribute 1: Deep discipline knowledge and intellectual breadth
Graduates have comprehensive knowledge and understanding of their subject area, the ability to engage with different traditions of thought, and the ability to apply their knowledge in practice including in multi-disciplinary or multi-professional contexts.
2, 4 Attribute 2: Creative and critical thinking, and problem solving
Graduates are effective problems-solvers, able to apply critical, creative and evidence-based thinking to conceive innovative responses to future challenges.
2, 4 Attribute 4: Professionalism and leadership readiness
Graduates engage in professional behaviour and have the potential to be entrepreneurial and take leadership roles in their chosen occupations or careers and communities.
1, 3, 4 Attribute 5: Intercultural and ethical competency
Graduates are responsible and effective global citizens whose personal values and practices are consistent with their roles as responsible members of society.
1, 3 -
Learning Resources
Required Resources
Linux Shell Resources
http://www.panix.com/~elflord/unix/bash-tute.html Links to an external site.
Quick tutorial
https://www.hackerrank.com/domains/shell Links to an external site.
Nice set of easy challenges to learn/review your shell coding skills
https://cmdchallenge.com/ Links to an external site.
Another set of shell challenges
Basic Linux Commands
http://overthewire.org/wargames/bandit/ Links to an external site.
Fun interactive games to learn basic Linux commands Links to an external site.
Regular Expressions
https://regexone.com/ Links to an external site.
Interactive tutorial
https://alf.nu/RegexGolf Links to an external site.
Regex challenges (shorter regex is better)Recommended Resources
Blogs and Podcasts
** This isn't a comprehensive list. Use your favourite RSS feeder to keep on top of news.
Blogs
Krebs on Security Links to an external site.
Schneier on Security Links to an external site.
Zerosec (Andy Gill) Links to an external site.
Reddit - Netsec Links to an external site.
Reddit - Ask_Netsec Links to an external site.
Podcasts
Patrick Gray's Risky Business Links to an external site.
The Darknet Diaries Links to an external site.
Cyber (by Motherboard)
Blackhills Information Security
Beers with Talos (Cisco Talos)
Defensive Security (Jerry Bell & Andrew Kalat)
Malicious Life
Many Hats Club
Root Access
Smashing Security
Thug Crowd
SANS Daily Stormcast Links to an external site.
Security Now! Links to an external site.
Hacker Public Radio Links to an external site.Online Learning
RSS
https://github.com/vortexau/FeedlySecrutiyFeds
Reddit
/r/security
/r/cybersecurity
/r/netsec
/r/asknetsec
/user/goretsky/m/security (links)
YouTube
John Hammond
LiverOverflow
NullByte
Hak5
HackerSploit
Derek Rook
DefCon
Professor Messer -
Learning & Teaching Activities
Learning & Teaching Modes
1-hour lecture per week for 12 weeks.
2-hour workshop with hands-on activities every week.Workload
The information below is provided as a guide to assist students in engaging appropriately with the course requirements.
The information below is provided as a guide to assist students in engaging appropriately with the course requirements.
Workload is approximately ~ 5hrs/week commitmentLearning Activities Summary
The course roughly comprises a weekly 1-hour lecture and a weekly 2-hour workshop.
Lectures: The lectures will focus more on the concept side of cybersecurity such as career paths, management, security engineering, social engineering and architecture, as well as some theoretical aspects such as cryptography.
Workshops: The workshops will focus more hands-on activities on the computer, exploring practical techniques that are required to perform security testing and forensics investigations. Each workshop will require the submission of an exercise with answers that must be uploaded onto MyUni.
IMPORTANT: You MUST attend the workshops and arrive early, as new materials will be covered at the beginning. Workshops are not recorded. If you cannot make the workshop you have registered for, contact your tutor and ask to attend another workshop.
This course has been designed to support you to achieve the course learning outcomes and develop broad skills that can be used in your academic and professional work.
Please familiarise yourself with the Course Outline and the information presented here in MyUni for this course.Specific Course Requirements
Basic coding and understanding of computer architecture, Linux, and shell commands -
Assessment
The 最新糖心Vlog's policy on Assessment for Coursework Programs is based on the following four principles:
- Assessment must encourage and reinforce learning.
- Assessment must enable robust and fair judgements about student performance.
- Assessment practices must be fair and equitable to students and give them the opportunity to demonstrate what they have learned.
- Assessment must maintain academic standards.
Assessment Summary
Assessment Task Weighting (%) Individual/ Group Formative/ Summative Due (week)* Hurdle criteria Learning outcomes CBOK Alignment** Exam 40 Individual Summative Exam Period Min 40% 1. 2. 3. 4. 1.2 2.1 2.2 3.3 5.4 Assignments 60 Individual Summative Week 3-11 1. 2. 3. 4. 1.2 2.1 2.2 3.3 5.4 Total 100
This assessment breakdown complies with the 最新糖心Vlog's Assessment for Coursework Programs Policy.
This course has a hurdle requirement. Meeting the specified hurdle criteria is a requirement for passing the course.
There are 5 individual assignments and a written final exam. The exam is a hurdle component.Assessment Related Requirements
A thorough understanding of the materials covered in the workshops and lectures is essential.Assessment Detail
Assessment information
This is a summary of all assessment tasks. Submission details will be made available in Assignments on the course navigation menu once the assessment is released/published.
All assessments adhere to the 最新糖心Vlog of Adelaide Assessment for Coursework Programs Policy.
Course assessments
Assessment 1: Cryptography
Weighting: 6%
Course Learning Outcomes:
CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.
CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
Due: Week 2
Assessment 2: OSINT, Recon & Network Scanning
Weighting:6%
Course Learning Outcomes:
CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.
CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
Due: Week 4
Assessment 3: Memory Attacks
Weighting:6%
Course Learning Outcomes:
CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.
Due: Week 6
Assessment 4: Network Attacks & Web Security
Weighting:6%
Course Learning Outcomes:
CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.
CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
Due: Week 8
Assessment 5: Web Application & Forensics
Weighting:6%
Course Learning Outcomes:
CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
Due: Week 10
Assessment 6: Capture The Flags
Weighting:30%
CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.
CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
Due: Week 12
Assessment 7 Final Exam
Weighting:40%
Course Learning Outcomes:
CLO 1: Describe career paths in cybersecurity and corresponding required skills, certifications and aptitudes.
CLO 3: Describe the role of information security in an organisation, and the main components of information security management frameworks to effectively manage risks.
Submission
Week 2, 4, 6, 8, 10 and 12Submission
No information currently available.
Course Grading
Grades for your performance in this course will be awarded in accordance with the following scheme:
M10 (Coursework Mark Scheme) Grade Mark Description FNS Fail No Submission F 1-49 Fail P 50-64 Pass C 65-74 Credit D 75-84 Distinction HD 85-100 High Distinction CN Continuing NFE No Formal Examination RP Result Pending Further details of the grades/results can be obtained from Examinations.
Grade Descriptors are available which provide a general guide to the standard of work that is expected at each grade level. More information at Assessment for Coursework Programs.
Final results for this course will be made available through .
-
Student Feedback
The 最新糖心Vlog places a high priority on approaches to learning and teaching that enhance the student experience. Feedback is sought from students in a variety of ways including on-going engagement with staff, the use of online discussion boards and the use of Student Experience of Learning and Teaching (SELT) surveys as well as GOS surveys and Program reviews.
SELTs are an important source of information to inform individual teaching practice, decisions about teaching duties, and course and program curriculum design. They enable the 最新糖心Vlog to assess how effectively its learning environments and teaching practices facilitate student engagement and learning outcomes. Under the current SELT Policy (http://www.adelaide.edu.au/policies/101/) course SELTs are mandated and must be conducted at the conclusion of each term/semester/trimester for every course offering. Feedback on issues raised through course SELT surveys is made available to enrolled students through various resources (e.g. MyUni). In addition aggregated course SELT data is available.
-
Student Support
- Academic Integrity for Students
- Academic Support with Maths
- Academic Support with writing and study skills
- Careers Services
- Library Services for Students
- LinkedIn Learning
- Student Life Counselling Support - Personal counselling for issues affecting study
- Students with a Disability - Alternative academic arrangements
-
Policies & Guidelines
This section contains links to relevant assessment-related policies and guidelines - all university policies.
- Academic Credit Arrangements Policy
- Academic Integrity Policy
- Academic Progress by Coursework Students Policy
- Assessment for Coursework Programs Policy
- Copyright Compliance Policy
- Coursework Academic Programs Policy
- Intellectual Property Policy
- IT Acceptable Use and Security Policy
- Modified Arrangements for Coursework Assessment Policy
- Reasonable Adjustments to Learning, Teaching & Assessment for Students with a Disability Policy
- Student Experience of Learning and Teaching Policy
- Student Grievance Resolution Process
-
Fraud Awareness
Students are reminded that in order to maintain the academic integrity of all programs and courses, the university has a zero-tolerance approach to students offering money or significant value goods or services to any staff member who is involved in their teaching or assessment. Students offering lecturers or tutors or professional staff anything more than a small token of appreciation is totally unacceptable, in any circumstances. Staff members are obliged to report all such incidents to their supervisor/manager, who will refer them for action under the university's student鈥檚 disciplinary procedures.
The 最新糖心Vlog of Adelaide is committed to regular reviews of the courses and programs it offers to students. The 最新糖心Vlog of Adelaide therefore reserves the right to discontinue or vary programs and courses without notice. Please read the important information contained in the disclaimer.