Telecommunication System Security

Undergraduate | 2026

Course page banner
Mode icon
Mode
Mode
Your studies will be on-campus, and may include some online delivery
On campus
area/catalogue icon
Area/Catalogue
ENGE X421
Course ID icon
Course ID
208460
Campus icon
Campus
Adelaide City Campus East, Mawson Lakes
Level of study
Level of study
Undergraduate
Unit value icon
Unit value
6
Course owner
Course owner
Elect & Mech Engineering
Course level icon
Course level
4
Study abroad and student exchange icon
Inbound study abroad and exchange
Inbound study abroad and exchange
The fee you pay will depend on the number and type of courses you study.
Yes
University-wide elective icon
University-wide elective course
Yes
Single course enrollment
Single course enrolment
Yes
alt
Note:
Course data is interim and subject to change

Course overview

The course aims to introduce senior undergraduates and early postgraduates in telecommunications engineering to methods of system security and data security. For system security, students will be acquainted with the principles of information assurance as well as frameworks of threat analysis and threat mitigation (e.g., MITRE ATT&CK, NIST Cybersecurity Framework). For data security, students will be trained in the applications of cryptography to data confidentiality, data integrity, source authentication and nonrepudiation. Students will also analyse how Shors algorithm hastens the development of post-quantum cryptography.

  • Overview And Frameworks
  • Theoretical Foundation
  • Cryptography

Course learning outcomes

  • Using standard frameworks, analyse threats to a telecommunication system and formulate a plan to mitigate the threats
  • Explain the assumptions, threat model, security definitions and design rationales on which a cryptographic primitive is based, and therefore the strengths and weaknesses of the primitive
  • Given application requirements and security objectives, determine the appropriate cryptographic schemes and associated parameters to use
  • Implement cryptographic algorithms and protocols for a given problem or application using established cryptographic libraries
  • Discuss the impact of quantum computing on traditional public-key cryptosystems, and the salient characteristics of post-quantum cryptosystems

Prerequisite(s)

N/A

Corequisite(s)

N/A

Antirequisite(s)

N/A

Degree list
The following degrees include this course