Security Operations and Incident Response

Undergraduate | 2026

Course page banner
Mode icon
Mode
Mode
Your studies will be on-campus, and may include some online delivery
On campus
area/catalogue icon
Area/Catalogue
INFO 2042
Course ID icon
Course ID
208371
Campus icon
Campus
Adelaide City Campus East, Mawson Lakes
Level of study
Level of study
Undergraduate
Unit value icon
Unit value
6
Course owner
Course owner
Computer Science &InfoTech
Course level icon
Course level
2
Study abroad and student exchange icon
Inbound study abroad and exchange
Inbound study abroad and exchange
The fee you pay will depend on the number and type of courses you study.
Yes
University-wide elective icon
University-wide elective course
Yes
Single course enrollment
Single course enrolment
Yes
alt
Note:
Course data is interim and subject to change

Course overview

This course aims to equip students with the skills and knowledge to effectively contribute to security operations and incident response teams. This course will cover the role and functions of a Security Operations Center (SOC), techniques for identifying, analysing, and assessing security threats and vulnerabilities, incident response strategies and procedures, security monitoring tools and technologies for threat detection and mitigation, and security automation and orchestration solutions. By the end of the course, students will obtain knowledge and skills to understand the role and functions of a SOC, identify and assess security threats and incidents, implement incident response strategies and procedures and develop proficiency in using tools and technologies for security monitoring and incident management.

Course learning outcomes

  • Explain the purpose, importance, responsibilities, roles, and key activities of Security Operations Centres (SOCs) in modern cyber security landscapes
  • Analyse security events and incidents to determine their severity and potential impact on organisational assets
  • Apply incident response methodologies and best practices to mitigate security breaches, minimise damage, recover from breaches and continuously improve an incident response process in a complex IT infrastructure
  • Utilise security tools, technologies, and threat intelligence effectively to monitor networks, detect threats, and respond to incidents in real-time

Prerequisite(s)

N/A

Corequisite(s)

N/A

Antirequisite(s)

N/A