COMP SCI 7308 - Advanced Cyber Security: Techniques & Concepts

North Terrace Campus - Trimester 1 - 2025

In this course, students will be introduced to real-world cyber security challenges that organisations face, and learn to apply knowledge and skills gained through other Computer Science courses to address them. The challenges will be examined both from the attacker's perspective (how systems are exploited) and the defender's perspectives (how to secure systems or respond to threats). Common attack and defence strategies for software, web applications, networks, operating systems, cryptographic systems and humans will be explored. The course will also introduce cyber security management concepts, including security operations, risk management, security engineering and security architecture, as well as provide guidance on different career paths specialising in cyber security. This course focuses on hands-on activities, and students are encouraged to participate in public and industry cybersecurity challenges, including capture-the-flag competitions.

  • General Course Information
    Course Details
    Course Code COMP SCI 7308
    Course Advanced Cyber Security: Techniques & Concepts
    Coordinating Unit Computer Science
    Term Trimester 1
    Level Postgraduate Coursework
    Location/s North Terrace Campus
    Units 3
    Contact Up to 3 hours per week
    Available for Study Abroad and Exchange N
    Prerequisites COMP SCI 7103, COMP SCI 7202, COMP SCI 7202B, COMP SCI 7208 or COMP SCI 7211
    Incompatible COMP SCI 7328, COMP SCI 3308
    Assumed Knowledge COMP SCI 7088
    Assessment Assignments and exam
    Course Staff

    Course Coordinator: Dr Sherif Haggag

    Course Timetable

    The full timetable of all activities for this course can be accessed from Course Planner.

  • Learning Outcomes
    Course Learning Outcomes
    On successful completion of this course, you will be able to:
    1 evaluate career paths in cyber security and corresponding required skills, certifications and aptitudes
    2 explain security assessment, including vulnerability scanning and network/web penetration testing and formulate some of these
    3 evaluate the information security in an organisation, the main components of information security management frameworks and how to effectively manage risks

    4 address cyber security challenges using forensic analysis skills such as binary file analysis and reverse engineering
    5 identify cyber-security-related privacy issues and ethical considerations.


    University Graduate Attributes

    This course will provide students with an opportunity to develop the Graduate Attribute(s) specified below:

    University Graduate Attribute Course Learning Outcome(s)

    Attribute 1: Deep discipline knowledge and intellectual breadth

    Graduates have comprehensive knowledge and understanding of their subject area, the ability to engage with different traditions of thought, and the ability to apply their knowledge in practice including in multi-disciplinary or multi-professional contexts.

    2, 4

    Attribute 2: Creative and critical thinking, and problem solving

    Graduates are effective problems-solvers, able to apply critical, creative and evidence-based thinking to conceive innovative responses to future challenges.

    2, 4

    Attribute 4: Professionalism and leadership readiness

    Graduates engage in professional behaviour and have the potential to be entrepreneurial and take leadership roles in their chosen occupations or careers and communities.

    1, 3, 4

    Attribute 5: Intercultural and ethical competency

    Graduates are responsible and effective global citizens whose personal values and practices are consistent with their roles as responsible members of society.

    1, 3
  • Learning Resources
    Required Resources
    Linux Shell Resources

    http://www.panix.com/~elflord/unix/bash-tute.html Links to an external site.
    Quick tutorial
    https://www.hackerrank.com/domains/shell Links to an external site.
    Nice set of easy challenges to learn/review your shell coding skills
    https://cmdchallenge.com/ Links to an external site.
    Another set of shell challenges
    Basic Linux Commands

    http://overthewire.org/wargames/bandit/ Links to an external site.
    Fun interactive games to learn basic Linux commands Links to an external site.
    Regular Expressions

    https://regexone.com/ Links to an external site.
    Interactive tutorial
    https://alf.nu/RegexGolf Links to an external site.
    Regex challenges (shorter regex is better)
    Recommended Resources
    Blogs and Podcasts
    ** This isn't a comprehensive list. Use your favourite RSS feeder to keep on top of news.

    Blogs
    Krebs on Security Links to an external site.
    Schneier on Security Links to an external site.
    Zerosec (Andy Gill) Links to an external site.
    Reddit - Netsec Links to an external site.
    Reddit - Ask_Netsec Links to an external site.
    Podcasts
    Patrick Gray's Risky Business Links to an external site.
    The Darknet Diaries Links to an external site.
    Cyber (by Motherboard)
    Blackhills Information Security
    Beers with Talos (Cisco Talos)
    Defensive Security (Jerry Bell & Andrew Kalat)
    Malicious Life
    Many Hats Club
    Root Access
    Smashing Security
    Thug Crowd
    SANS Daily Stormcast Links to an external site.
    Security Now! Links to an external site.
    Hacker Public Radio Links to an external site.

    Online Learning
    RSS
    https://github.com/vortexau/FeedlySecrutiyFeds
    Reddit
    /r/security
    /r/cybersecurity
    /r/netsec
    /r/asknetsec
    /user/goretsky/m/security (links)
    YouTube
    John Hammond
    LiverOverflow
    NullByte
    Hak5
    HackerSploit
    Derek Rook
    DefCon
    Professor Messer
  • Learning & Teaching Activities
    Learning & Teaching Modes
    Weekly 1-hour lecture
    • Weekly 2-hour workshop

    Workload

    The information below is provided as a guide to assist students in engaging appropriately with the course requirements.

    (1hr)~ 5hrs/week commitment
    Learning Activities Summary
    The course roughly comprises a weekly 1-hour lecture and a weekly 2-hour workshop.

    Lectures: The lectures will focus more on the "soft" side of cybersecurity such as career paths, management, security engineering, social engineering and architecture, as well as some theoretical aspects such as cryptography.

    Workshops: The workshops will focus more hands-on activities on the computer, exploring practical techniques that are required to perform security testing and forensics investigations. Each workshop will require submission of an exercise with answers that must be uploaded onto MyUni.

    IMPORTANT: You MUST attend the workshops and arrive early, as new materials will be covered at the beginning. Workshops are not recorded. If you cannot make the workshop you have registered for, contact your tutor and ask to attend another workshop.

    This course has been designed to support you to achieve the course learning outcomes and develop broad skills that can be used in your academic and professional work.

    Please familiarise yourself with the Course Outline and the information presented here in MyUni for this course.
    Specific Course Requirements
    coding and understanding cmd commands
  • Assessment

    The University's policy on Assessment for Coursework Programs is based on the following four principles:

    1. Assessment must encourage and reinforce learning.
    2. Assessment must enable robust and fair judgements about student performance.
    3. Assessment practices must be fair and equitable to students and give them the opportunity to demonstrate what they have learned.
    4. Assessment must maintain academic standards.

    Assessment Summary
    5 individual assignment, a capture the flags test  and written final exam
    Assessment Related Requirements
    You need to learn what is taught in the workshop in order to get his done.
    Assessment Detail
    Assessment information

    This is a summary of all assessment tasks. Submission details will be made available in Assignments on the course navigation menu once the assessment is released/published.

    All assessments adhere to the University of Adelaide Assessment for Coursework Programs Policy.

    Course assessments

    Assessment 1: Cryptography
    Weighting: 6%
    Course Learning Outcomes:

    CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.

    CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
    Due: Week 2

    Assessment 2: OSINT, Recon & Network Scanning
    Weighting:6%

    Course Learning Outcomes:

    CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.

    CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
    Due: Week 4

    Assessment 3: Memory Attacks
    Weighting:6%

    Course Learning Outcomes:

    CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.
    Due: Week 6

    Assessment 4: Network Attacks & Web Security
    Weighting:6%

    Course Learning Outcomes:

    CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.

    CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
    Due: Week 8

    Assessment 5: Web Application & Forensics
    Weighting:6%

    Course Learning Outcomes:

    CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.
    Due: Week 10

    Assessment 6: Capture The Flags
    Weighting:30%

    CLO 2: Demonstrate ability to undertake basic security assessment, including vulnerability scanning and network/web penetration testing.

    CLO 4: Demonstrate basic skills in computer forensic analysis, including binary file analysis and reverse engineering.

    Due: Week 12

    Assessment 7 Final Exam
    Weighting:40%

    Course Learning Outcomes:

    CLO 1: Describe career paths in cybersecurity and corresponding required skills, certifications and aptitudes.

    CLO 3: Describe the role of information security in an organisation, and the main components of information security management frameworks to effectively manage risks.

    Submission
    Week 2, 4, 6, 8, 10 and 12
    Submission
    Week 2, 4, 6, 8, 10 and 12
    Course Grading

    Grades for your performance in this course will be awarded in accordance with the following scheme:

    M10 (Coursework Mark Scheme)
    Grade Mark Description
    FNS   Fail No Submission
    F 1-49 Fail
    P 50-64 Pass
    C 65-74 Credit
    D 75-84 Distinction
    HD 85-100 High Distinction
    CN   Continuing
    NFE   No Formal Examination
    RP   Result Pending

    Further details of the grades/results can be obtained from Examinations.

    Grade Descriptors are available which provide a general guide to the standard of work that is expected at each grade level. More information at Assessment for Coursework Programs.

    Final results for this course will be made available through Access Adelaide.

  • Student Feedback

    The University places a high priority on approaches to learning and teaching that enhance the student experience. Feedback is sought from students in a variety of ways including on-going engagement with staff, the use of online discussion boards and the use of Student Experience of Learning and Teaching (SELT) surveys as well as GOS surveys and Program reviews.

    SELTs are an important source of information to inform individual teaching practice, decisions about teaching duties, and course and program curriculum design. They enable the University to assess how effectively its learning environments and teaching practices facilitate student engagement and learning outcomes. Under the current SELT Policy (http://www.adelaide.edu.au/policies/101/) course SELTs are mandated and must be conducted at the conclusion of each term/semester/trimester for every course offering. Feedback on issues raised through course SELT surveys is made available to enrolled students through various resources (e.g. MyUni). In addition aggregated course SELT data is available.

  • Student Support

    Counselling for Fully Online Postgraduate Students

    Fully online students can access counselling services here:

    Phone: 1800 512 155 (24/7) 

    SMS service: 0439 449 876 (24/7) 

    Email: info@assureprograms.com.au

    Go to the Study Smart Hub to learn more, or speak to your Student Success Advisor (SSA) on 1300 296 648 (Monday to Thursday, 8.30am–5pm ACST/ACDT, Friday, 8.30am–4.30pm ACST/ACDT)

  • Policies & Guidelines
  • Fraud Awareness

    Students are reminded that in order to maintain the academic integrity of all programs and courses, the university has a zero-tolerance approach to students offering money or significant value goods or services to any staff member who is involved in their teaching or assessment. Students offering lecturers or tutors or professional staff anything more than a small token of appreciation is totally unacceptable, in any circumstances. Staff members are obliged to report all such incidents to their supervisor/manager, who will refer them for action under the university's student’s disciplinary procedures.

The University of Adelaide is committed to regular reviews of the courses and programs it offers to students. The University of Adelaide therefore reserves the right to discontinue or vary programs and courses without notice. Please read the important information contained in the disclaimer.