RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE Meeting. 2/2017 of the will be held on Thursday 30 March 2017 at 12pm in Room R212, Ian Ross Building (31). Apologies and enquiries should be sent to: Melissa.Coppin@anu.edu.au Summary S.1 Curriculum Proposals Recommendation: That the Committee endorse the proposals for submission to the CECS Education Committee. Attachment: Appendix A RSCS Curriculum Proposals For decision 2 3 Page 1
Item S.1 Curriculum Proposals Purpose To review curriculum proposals from the Research School of Computer Science submitted to the Committee for their endorsement. Recommendation That the Committee review the below proposals and endorse them for submission to the CECS Education Committee. ACTION REQUIRED For discussion For decision For information For response Background New Courses Page Course Code Title 3 COMP 2700 Cyber Security Foundations 6 COMP 3701 Defensive Cyber Security Operations 9 COMP 3702 Offensive Cyber Security Operations Sponsor Associate Director (Education) Research School of Computer Science Appendices Appendix A RSCS Curriculum Proposal forms Page 2
Send by Email Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 2700 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course is the foundational course in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Cyber Security Foundations (100 characters) Short Course Title Cyber Security Foundations (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Email Primary Convenor's Name New appointment imminent who will convene this new course in 2018. Course Description Course Structure and Content Learning Outcomes Cyber Security Foundations introduces all essential cyber security principles. This includes principles of secure design, secrets minimization, least privilege, isolation, separation and encapsulation. The interplay between failed security principles and vulnerabilities is investigated in detail. The course provides the essential foundations which allow students to continue in a more in-depth cyber security career, yet can also be used a standalone unit to provide a self-contained set of knowledge. This is a general, second year course in our u/g programs which also serves as a foundational course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential cyber security principles. 1. Demonstrate a thorough understanding of the fundamental principles underlying Cyber Security. 2. Define and identify cyber security principles and their violation. 3. Apply cyber security principles in a practical context. 4. Migrate insights from cyber security analysis into new designs. 5. Communicate a cyber security thread to a heterogenous team of professionals. Page 3
Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2420 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. At least one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Associate Professor Jochen Trumpf Page 4
Is Consent Required to Enrol? If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) 07345 Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 2 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by Email to Course Registry Page 5
Send by Email Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 3701 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course covers the defensive Cyber Security aspects in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Defensive Cyber Security Operations (100 characters) Short Course Title Defensive Cyber Security Op (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Email Primary Convenor's Name New appointment imminent who will convene this new course in 2018. Course Description Course Structure and Content Learning Outcomes Defensive Cyber Security operations introduces and exercises a complete range of anomaly / intrusion detection and identification mechanisms. The students will also learn and exercise the handling of an existing intrusion which includes forensic operations and well as securing the remaining systems. This is a complete course in cyber defense which enables students on successful completion to operate systems under realworld exposure. This is a general, second year course in our u/g programs which also serves as an advanced course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential, defensive Cyber Security operations. 1. Demonstrate a thorough understanding of the fundamental principles underlying the defence of systems and networks. 2. Define and identify defensive cyber security architectures and their purpose. 3. Operate defensive network architectures and systems in a practical context. 4. Extrapolate current threats and identify potential, future threats. 5. Communicate a cyber security situation and response to a heterogenous team of professionals. Page 6
Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2700 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. About one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Associate Professor Jochen Trumpf Page 7
Is Consent Required to Enrol? If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) 07345 Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 1 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by Email to Course Registry Page 8
Send by Email Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 3702 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course covers the offensive Cyber Security aspects in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Offensive Cyber Security Operations (100 characters) Short Course Title Offensive Cyber Security Op (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Email Primary Convenor's Name New appointment imminent who will convene this new course in 2018. Course Description Course Structure and Content Learning Outcomes Offensive Cyber Security operations introduces and exercises a complete range of reverse engineering techniques and attack patterns. The students will also learn and exercise the analysis of systems based on minimal information. This is a complete course in cyber attacks which enables students on successful completion to identify and test systems for vulnerabilities without full knowledge or direct access. This is a general, second year course in our u/g programs which also serves as an advanced course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential, offensive Cyber Security operations. 1. Demonstrate a thorough understanding of the fundamental principles underlying the identification and testing for vulnerabilities with limited information. 2. Analyze a system across all abstraction level, from basic hardware to complex cloud architectures. 3. Run cyber attacks, tests and probes in a practical context. 4. Expand conventional attack patterns to work in new system and network architectures. 5. Communicate a cyber security vulnerability and potential paths of attack to a heterogenous team of professionals. Page 9
Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2700 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. About one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Is Consent Required to Enrol? Associate Professor Jochen Trumpf Page 10
If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) 07345 Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 2 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by Email to Course Registry Page 11