RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE

Similar documents
Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

FORM 7: Certificate Approval and Modification

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

This Programme Schedule applies to the Bachelor of Computing Systems (BCS) Level 7 credits 360.

Information Systems and Tech (IST)

ITSY Information Technology Security Course Syllabus Spring 2018

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010

An Expert Panel was convened to review the submission of the following programme:

Washtenaw Community College Comprehensive Report. CNT 216 Routing and Switching Essentials Effective Term: Fall 2018

Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001)

Course Specifications M. Tech. / PG Diploma Programme

PROGRAMME SPECIFICATION

Information Systems. Courses. Information Systems 1

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Campus Solutions: Student Records. Quick Reference Guide

ADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS

CYBERSECURITY: Scholarship and Job Opportunities

On Campus. Computing. School of Architecture, Computing and Engineering 11 November Taught by UEL staff

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Department of Computer Science

Bachelor of Information Technology (Network Security)

Part A: Course Outline

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

INFORMATION SYSTEMS, BACHELOR OF SCIENCE (B.S.)

Quality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma

Software Assurance Education Overview

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

Computer Information Systems

The GenCyber Program. By Chris Ralph

School of Computer Science

ITCC Cisco Exploration 1: Networking Fundamentals

ab Houston Community College

This programme is only offered at: Kazan State University for Architecture and Engineering (KSUAE)

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008)

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

PROPOSAL TO INTRODUCE A NEW COURSE

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Network Security

MODULE SPECIFICATIONS

Expected start dates September Placements 30 weeks, optional Partnership model Not applicable

Syllabus. Computer Science Information Technology 975. Information Storage and Management for Computer Networks

MSc in Information Systems

BS in Information Technology

Programme Specification

Qualification details

Certification. What: Who: Where:

BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Academic Program Review Cyber Security College of Southern Nevada 2017

SAULT COLLEGE OF APPLIED ARTS & TECHNOLOGY SAULT STE MARIE, ON COURSE OUTLINE

Response to the Validation Panel for the DIT Foundation Programmes

Programme title: BSc (Hons) Forensic Archaeology and Anthropology

DIABLO VALLEY COLLEGE CATALOG

College of Arts, Letters, and Education. Special Education and Elementary Education BAE

GRADUATE CURRICULUM COMMITTEE REPORT

CCNA Cybersecurity Operations. Program Overview

Honours in Information Systems

CSC 4992 Cyber Security Practice

Curriculum for the Bachelor's Degree Programme in Software Development National section

Computer Information Systems Technology (CIS)

AE Computer Programming for Aerospace Engineers

Loyola Marymount University School of Education

Programme Specification

Computer Networks IT321

New Zealand Diploma in Engineering

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

Programme Specification

South Portland, Maine Computer Information Technology. Web Site: blackboard.smccme.edu. Course Syllabus

SOFTWARE ENGINEERING. Curriculum in Software Engineering. Program Educational Objectives

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

MSIT Program Handbook. Master of Science in Information Technology

DESIGN. College of the Arts. Career Possibilities. Undergraduate Programs. Bachelor of Arts in Design (120 Units) 2014/2015 CSULB Catalog Design 335

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017

Introducing Cyber Resiliency Concerns Into Engineering Education

College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 4 May Program Description and Course Requirements

CSC 210 COMPUTER SCIENCE II

INFORMATION TECHNOLOGY, BS

This version of the programme is no longer recruiting. Please see the specification for BSc (Hons) Software Engineering.

BEng (Hons) Civil Engineering E410 (Under Review)

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18

Computer Science & IT

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

b. Remediation will only be offered for courses offered at the home school.

Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year

BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department

University of Wisconsin-Stout Menomonie, WI

Course Code(s): FS002H01UV Full-time 3 Years FS002H31UV Part-Time 6 Years

Cybersecurity Essentials

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO. Sault College COURSE OUTLINE CODE NO. : CSD100 SEMESTER: 1

CSC 562: Graduate Introduction to Game Engine Design

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

CCNA Cybersecurity Operations 1.1 Scope and Sequence

UNDERGRADUATE PROGRAMME SPECIFICATION

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Transcription:

RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE Meeting. 2/2017 of the will be held on Thursday 30 March 2017 at 12pm in Room R212, Ian Ross Building (31). Apologies and enquiries should be sent to: Melissa.Coppin@anu.edu.au Summary S.1 Curriculum Proposals Recommendation: That the Committee endorse the proposals for submission to the CECS Education Committee. Attachment: Appendix A RSCS Curriculum Proposals For decision 2 3 Page 1

Item S.1 Curriculum Proposals Purpose To review curriculum proposals from the Research School of Computer Science submitted to the Committee for their endorsement. Recommendation That the Committee review the below proposals and endorse them for submission to the CECS Education Committee. ACTION REQUIRED For discussion For decision For information For response Background New Courses Page Course Code Title 3 COMP 2700 Cyber Security Foundations 6 COMP 3701 Defensive Cyber Security Operations 9 COMP 3702 Offensive Cyber Security Operations Sponsor Associate Director (Education) Research School of Computer Science Appendices Appendix A RSCS Curriculum Proposal forms Page 2

Send by Email Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 2700 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course is the foundational course in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Cyber Security Foundations (100 characters) Short Course Title Cyber Security Foundations (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Email Primary Convenor's Name New appointment imminent who will convene this new course in 2018. Course Description Course Structure and Content Learning Outcomes Cyber Security Foundations introduces all essential cyber security principles. This includes principles of secure design, secrets minimization, least privilege, isolation, separation and encapsulation. The interplay between failed security principles and vulnerabilities is investigated in detail. The course provides the essential foundations which allow students to continue in a more in-depth cyber security career, yet can also be used a standalone unit to provide a self-contained set of knowledge. This is a general, second year course in our u/g programs which also serves as a foundational course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential cyber security principles. 1. Demonstrate a thorough understanding of the fundamental principles underlying Cyber Security. 2. Define and identify cyber security principles and their violation. 3. Apply cyber security principles in a practical context. 4. Migrate insights from cyber security analysis into new designs. 5. Communicate a cyber security thread to a heterogenous team of professionals. Page 3

Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2420 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. At least one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Associate Professor Jochen Trumpf Page 4

Is Consent Required to Enrol? If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) 07345 Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 2 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by Email to Course Registry Page 5

Send by Email Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 3701 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course covers the defensive Cyber Security aspects in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Defensive Cyber Security Operations (100 characters) Short Course Title Defensive Cyber Security Op (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Email Primary Convenor's Name New appointment imminent who will convene this new course in 2018. Course Description Course Structure and Content Learning Outcomes Defensive Cyber Security operations introduces and exercises a complete range of anomaly / intrusion detection and identification mechanisms. The students will also learn and exercise the handling of an existing intrusion which includes forensic operations and well as securing the remaining systems. This is a complete course in cyber defense which enables students on successful completion to operate systems under realworld exposure. This is a general, second year course in our u/g programs which also serves as an advanced course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential, defensive Cyber Security operations. 1. Demonstrate a thorough understanding of the fundamental principles underlying the defence of systems and networks. 2. Define and identify defensive cyber security architectures and their purpose. 3. Operate defensive network architectures and systems in a practical context. 4. Extrapolate current threats and identify potential, future threats. 5. Communicate a cyber security situation and response to a heterogenous team of professionals. Page 6

Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2700 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. About one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Associate Professor Jochen Trumpf Page 7

Is Consent Required to Enrol? If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) 07345 Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 1 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by Email to Course Registry Page 8

Send by Email Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 3702 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course covers the offensive Cyber Security aspects in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Offensive Cyber Security Operations (100 characters) Short Course Title Offensive Cyber Security Op (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Email Primary Convenor's Name New appointment imminent who will convene this new course in 2018. Course Description Course Structure and Content Learning Outcomes Offensive Cyber Security operations introduces and exercises a complete range of reverse engineering techniques and attack patterns. The students will also learn and exercise the analysis of systems based on minimal information. This is a complete course in cyber attacks which enables students on successful completion to identify and test systems for vulnerabilities without full knowledge or direct access. This is a general, second year course in our u/g programs which also serves as an advanced course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential, offensive Cyber Security operations. 1. Demonstrate a thorough understanding of the fundamental principles underlying the identification and testing for vulnerabilities with limited information. 2. Analyze a system across all abstraction level, from basic hardware to complex cloud architectures. 3. Run cyber attacks, tests and probes in a practical context. 4. Expand conventional attack patterns to work in new system and network architectures. 5. Communicate a cyber security vulnerability and potential paths of attack to a heterogenous team of professionals. Page 9

Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2700 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. About one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Is Consent Required to Enrol? Associate Professor Jochen Trumpf Page 10

If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) 07345 Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 2 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by Email to Course Registry Page 11