Bachelor of Cyber Security
2025 Deakin University Handbook
Year | 2025 course information |
---|---|
Award granted | Bachelor of Cyber Security |
Deakin course code | S334 |
Faculty | Faculty of Science, Engineering and Built Environment |
Campus | Offered at Burwood (Melbourne), Waurn Ponds (Geelong) |
Online | Yes |
Duration | 3 years full-time or part-time equivalent |
Course Map - enrolment planning tool | This course map is for new students commencing from Trimester 1 2025 Course maps for commencement in previous years are available on the Course Maps webpage or please contact a Student Adviser in Student Central. |
CRICOS course code | 091336M Burwood (Melbourne), Waurn Ponds (Geelong) |
Australian Qualifications Framework (AQF) recognition | The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 7 |
Course sub-headings
- Course overview
- Indicative student workload
- Professional recognition
- Career opportunities
- Participation requirements
- Mandatory student checks
- Course Learning Outcomes
- Course rules
- Minors
- Course structure
- Work experience
- Details of minor sequences
- Other learning experiences
- Fees and charges
Course overview
Cyber security threats are a rapidly growing global challenge for individuals and businesses alike. Secure technology is not only pivotal to business, but to everyday life. As a result, cyber security professionals are in high demand around the world. Deakin’s Bachelor of Cyber Security equips you with the essential skills to investigate and combat cybercrime and cyber terrorism. You will graduate with the expertise to tackle one of the fastest-growing criminal threats to modern-day society.
Gain practical and theoretical knowledge with an emphasis on assessing cyber security in a working environment, as well as the business, ethical and legal implications of risk management. You will cover areas such as computer crime and digital forensics and gain the skills to identify, diagnose and manage the challenges of cyber security. As a graduate, you will be well prepared for an exciting career in one of the most in-demand global industries.
Are you ready to join the fight against cybercrime?
Rise to the challenge of cybercrime with a world class degree from a university ranked in the top 1% globally for computer science and information systems.*
This course equips you with the skills demanded by a diverse range of industry and government sectors, covering areas such as:
- computer crime and digital forensics
- evaluating software for security vulnerabilities
- designing secure databases
- securing operating systems
- assessing and reinforcing the security of websites
- integrating security requirements into new developments
- designing secure network architectures
- performing risk assessments and responding to cyber security incidents.
With access to our specialised capstone project and co-working space, you will collaborate with your teammates on your capstone project, develop solutions to real-world industry problems and learn agile project management methods, widely used across the industry. Our past students have collaborated on capstone projects such as:
- is my smart home secure enough?
- virtual penetration testing lab
- one-time pad (OTP) VPN
- voice activated password security
- secure Australian online voting system.
This course also includes a core IT work placement unit, where you will undertake professional work experience with an approved host organisation. You may also have the opportunity to access one of 50 guaranteed employment placements with banks, including partnerships with NAB, ANZ and Dimension Data. You will work on industry projects, gain experience in entrepreneurship, and acquire valuable business skills.
This experience ensures you will be well-prepared to apply your learning in the workplace and deal with imminent threats and challenges emerging in the digital space.
*2022 ShanghaiRankings Global Ranking of Academic Subjects.
Indicative student workload
You can expect to participate in a range of teaching activities each week. This could include lectures, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.
Professional recognition
The Bachelor of Cyber Security is professionally accredited with the Australian Computer Society (ACS).
Career opportunities
Graduate with the skills needed to thrive in a booming industry and help secure our digital future. Australian Government employment projections predict a 38.9% growth for database and systems administrators and ICT security specialists for the five years from November 2021 to November 2026*. Take advantage of this huge demand for cyber security specialists with the Bachelor of Cyber Security at Deakin.
As a graduate you may find employment in one of the following roles:
- cyber security analyst
- network security analyst
- cyber threat analyst
- incident responder
- operations coordinator
- penetration tester
- cyber security advisor
- vulnerability researcher
- cyber security consultant
- information security auditor
- IT security engineer
- digital forensics analyst
- project manager
- cyber security system developer or programmer
- cyber security system manager.
*Source: Jobs and Skills Australia Employment Projections to 2026
Participation requirements
Placement can occur at any time, including during standard holiday breaks. Learn about key dates at Deakin.Elective units may be selected that include compulsory placements, work-based training, community-based learning or collaborative research training arrangements.
Reasonable adjustments to participation and other course requirements will be made for students with a disability. More information available at Disability support services.
Mandatory student checks
Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.
Equipment requirements
The learning experiences and assessment activities within this course require that students have access to a range of technologies beyond a desktop computer or laptop. Students will be required to purchase minor equipment, such as small single board computers, microcontrollers and sensors, which will be used within a range of units in this course. This equipment is also usable by the student beyond their studies. Equipment requirements and details of suppliers will be provided on a per-unit basis. The indicative cost of this equipment for this course is AUD$500.
For information regarding hardware and software requirements, please refer to the Bring your own device (BYOD) guidelines via the School of Information Technology website in addition to the individual unit outlines in the Handbook.
Combined courses
The Bachelor of Cyber Security is also available as the following combined courses
- D380 Bachelor of Criminology/Bachelor of Cyber Security
- D397 Bachelor of Laws/Bachelor of Cyber Security
Course Learning Outcomes
Deakin Graduate Learning Outcomes | Course Learning Outcomes |
---|---|
Discipline-specific knowledge and capabilities | Develop a broad, coherent knowledge of the IT discipline including its dynamic environment, with detailed knowledge of project management principles and in depth knowledge in IT Security. Design, develop and implement IT systems and software, and associated policies and procedures for optimal use and apply industry standards and best practice in one or more specialised areas of IT. Acquire in-depth knowledge and skills to develop, implement and manage security solutions for systems, networks, and data according to industry-accepted standards and best practice. |
Communication | Communicate in a professional context to inform, explain and drive sustainable innovation through cyber security, utilising a range of verbal, graphical and written methods, recognising the needs of diverse audiences. |
Digital literacy | Use digital technologies, platforms, frameworks and tools from the field of cyber security to generate, manage, process and share digital resources and solutions. |
Critical thinking | Critically analyse information provided to inform decision making and evaluation of plans and solutions associated with the field of cyber security. |
Problem solving | Apply cognitive, technical, and creative skills from cyber security to understand requirements and design, implement, and operate solutions to real-world and ill-defined computing problems. |
Self-management | Work independently to apply knowledge and skills to new situations in professional practice and/or further learning in the field of cyber security with adaptability, autonomy, responsibility, and personal accountability for actions as a practitioner and a learner. |
Teamwork | Work independently and collaboratively to achieve team goals, contributing knowledge and skills from cyber security to advance the teams objectives, employing effective teamwork practices and principles, and comprehending distinct workplace roles and their functions. |
Global citizenship | Apply professional and ethical standards and accountability in the field of cyber security, and engage openly and respectfully with diverse communities and cultures. |
Course rules
To complete the Bachelor of Cyber Security students must pass 24 credit points and meet the following course rules to be eligible to graduate:
- DAI001 Academic Integrity and Respect at Deakin (0-credit-point compulsory unit) in their first study period
- SIT010 Safety Induction Program (0-credit-point compulsory unit)
- STP010 Career Tools for Employability (0-credit-point compulsory unit)
- 13 credit points of core units
- 3 credit points of cyber security capstone units
- 1 minor (4 credit points)
- 4 credit points of open elective units
- a maximum of 10 credit points at level 1
- a minimum of 6 credit points at level 3
Students are required to meet the University's academic progress and conduct requirements. See the enrolment codes and terminology to help make sense of the University’s vocabulary.
Minors
Refer to the details of each minor sequence for availability.
Course structure
Course Certifications
The following units are designed to align with established cyber security industry certifications.
SIT182 | Real World Practices for Cyber Security |
SIT218 | Secure Coding |
SIT282 | Computer Forensics and Investigations |
SIT379 | Ethical Hacking |
Examples of industry certifications include, but are not limited to:
- Certified Ethical Hacker (CEH)
- Certified Secure Programmer (ECSP)
- Computer Hacking Forensic Investigator (CHFI)
- Cybersecurity Fundamentals (CSX)
These industry certifications are recognised globally and provide an indication of your competency in these highly skilled cyber security areas.
Course structure
Core
Year 1 -Trimester 1
DAI001 | Academic Integrity and Respect at Deakin (0 credit points) |
SIT010 | Safety Induction Program (0 credit points) |
STP010 | Career Tools for Employability (0 credit points) |
SIT102 | Introduction to Programming |
SIT111 | Computer Systems |
SIT182 | Real World Practices for Cyber Security |
SIT192 | Discrete Mathematics |
Year 1 - Trimester 2
SIT202 | Computer Networks and Communication |
SIT232 | Object-Oriented Development |
Plus 2 minor or open elective units (2 credit points)
Year 2 - Trimester 1
SIT282 | Computer Forensics and Investigations |
SIT384 | Cyber Security Analytics |
Plus 2 minor or open elective units (2 credit points)
Year 2 - Trimester 2
SIT218 | Secure Coding |
SIT223 | Professional Practice in Information Technology # |
Plus 2 minor or open elective units (2 credit points)
Year 3 - Trimester 1
SIT324 | Malware Analysis |
SIT327 | Network Forensics |
SIT374 | Team Project (A) - Project Management and Practices ^ |
Plus 1 minor or open elective unit (1 credit point)
Year 3 - Trimester 2
SIT379 | Ethical Hacking |
Plus 1 minor or open elective unit (1 credit point)
Plus 2 credit points from the following capstone options:
SIT378 | Team Project (B) - Execution and Delivery ^ |
SIT306 | IT Placements and Industry Experience ^+ |
OR
SIT344 | Professional Practice (2 credit points) ^+ |
^ Offered in Trimester 1, Trimester 2, Trimester 3.
+ Students must have completed STP010 Career Tools for Employability (0-credit point compulsory unit) and SIT223 Professional Practice in Information Technology.
# Corequisite of STP010 Career Tools for Employability (0-credit point compulsory unit).
It is important to ensure your course plan meets the course rules detailed above. Students should contact Student Central for assistance with course planning, choosing the right units and understanding course rules.
Electives
Select from a range of elective units offered across many courses. You may even be able to choose elective units from a completely different discipline area (subject to meeting unit requirements).
Work experience
This course includes a compulsory work placement with an approved host organisation to take your learning beyond the classroom and prepare you to be work and career ready. Work Integrated Learning (WIL) units offered in this course provide you with the opportunity to develop your professional networks and work practices while completing your degree.
Elective units may also provide additional opportunities for Work Integrated Learning experiences.
For more information visit SEBE Work Integrated Learning.
Details of minor sequences
Security Management
Campuses
Burwood (Melbourne), Geelong (Waurn Ponds), Online
Unit set code
MN-S000003
Overview
The Security Management minor will give you opportunity to use your learned managerial and cyber security skills to assist companies in their planning, governance and change policies, ensuring their resilience and defence of related threats.
Units
Four units from:
MIS211 | Cyber Security and Governance * |
MMH356 | Change Management * |
MMM132 | Management * |
SIT182 | Real World Practices for Cyber Security |
SIT284 | Cyber Security Management * |
*Students in S326, S334 and S434 should undertake MIS211, MMH356, MMM132 and SIT284.
Network Security
Campuses
Burwood (Melbourne), Geelong (Waurn Ponds), Online
Unit set code
MN-S000010
Overview
Learn the details of defending computer networks. Study advanced network defence techniques including using forensics, machine learning, and data science to protect network data from attackers.
Units
SIT221 | Data Structures and Algorithms |
SIT281 | Cryptography |
SIT325 | Advanced Network Security |
SIT326 | Advanced Network Analytics and Forensics |
Course duration
Course duration may be affected by delays in completing course requirements, such as failing of units or accessing or completing placements.
Further information
Student Central can help you with course planning, choosing the right units and explaining course rules and requirements.
- Contact Student Central
Other learning experiences
To broaden your experience of the world, you will have an opportunity to participate in overseas placements and study tours as an elective option in your course.
Fees and charges
Fees and charges vary depending on the type of fee place you hold, your course, your commencement year, the units you choose to study, and their study discipline or your study load.
Tuition fees increase at the beginning of each calendar year and all fees quoted are in Australian dollars ($AUD). Tuition fees do not include textbooks, computer equipment or software, other equipment or costs such as mandatory checks, travel and stationery.
For further information regarding tuition fees, other fees and charges, invoice due dates, withdrawal dates, payment methods visit our Current students website.