Graduate Certificate of Cyber Security
2022 Deakin University Handbook
Year | 2022 course information |
---|---|
Award granted | Graduate Certificate of Cyber Security |
Course Map | This course map is for new students commencing from Trimester 1 2022. This course map is for new students commencing from Trimester 2 2022. This course map is for new students commencing from Trimester 3 2022. |
Campus | Offered at Waurn Ponds (Geelong) |
Cloud Campus | Yes |
Duration | One year part-time |
Deakin course code | S535 |
Approval status | This course is approved by the University under the Higher Education Standards Framework. |
Australian Qualifications Framework (AQF) recognition | The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 8. |
INTERNATIONAL STUDENTS – Please note that due to Australian Government regulations, student visas to enter Australia cannot be issued to students who enrol in Deakin’s Cloud Campus. |
Course sub-headings
- Course overview
- Indicative student workload
- Career opportunities
- Participation requirements
- Mandatory student checks
- Pathways
- Fees and charges
- Course Learning Outcomes
- Course rules
- Course structure
Course overview
In today's digital world – where technology is pivotal to business, government and daily life – cyber security threats are a major challenge across many industry sectors. And as cyber-attacks are becoming everyday occurrences, cyber security professionals are in increasing demand globally.
Through the Graduate Certificate of Cyber Security, you will learn how to identify, diagnose and manage the challenges of cyber security threats, and graduate ready for a successful cyber security career anywhere in the world.
Focusing on a range of key industry-relevant areas, you will develop knowledge and expertise about system security and digital forensics, analytics and organisational security.
This course gives you the cyber security skills that are crucial to the success of our digital future. You will graduate equipped with the knowledge and talent to take on an expert security role within business, government or law enforcement.
Indicative student workload
You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.
Career opportunities
Career options are varied so you could work anywhere in the world as a:
- security analyst
- project manager
- security system manager
- cryptographer
- security consultant
- security system developer or programmer information security auditor
- business continuity or IT security engineer.
Participation requirements
Reasonable adjustments to participation and other course requirements will be made for students with a disability. Click here for more information.
Mandatory student checks
Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.
Pathways
After successfully completing your graduate certificate, you can continue your study by using the credit points you’ve earned to enter the:
Fees and charges
Fees and charges vary depending on your course, the type of fee place you hold, your commencement year, the units you choose and your study load. To find out about the fees and charges that apply to you, visit the Current students fees website or our handy Fee estimator to help estimate your tuition fees.
Tuition fees increase at the beginning of each calendar year and all fees quoted are in Australian dollars ($AUD). Tuition fees do not include textbooks, computer equipment or software, other equipment or costs such as photocopying or travel.
Course Learning Outcomes
Deakin Graduate Learning Outcomes | Course Learning Outcomes |
Discipline-specific knowledge and capabilities | Develop specialised and essential knowledge of security needs for design and development of secure systems, processes, concepts, and technologies; to develop software systems, products and solutions that automate business processes at par with benchmarks and industry standards and based on evolving cyber security needs. |
Communication | Communicate secure solutions as appropriate to the context to inform, motivate and effect change utilising a range of verbal, graphical and written methods, recognising the needs of diverse technical and non-technical audiences. |
Digital literacy | Use digital media to locate, collect and evaluate information from technical sources and apply cyber security discipline knowledge to identify approaches and solutions that meet the requirements of real-world organisations in the context of the evolving cyber threat landscape. |
Critical thinking | Use the frameworks of logical and analytical thinking to evaluate specialist computing assets, technical problems, and user requirements, and develop approaches to develop innovative solutions for real-world practice of cybersecurity. |
Problem solving | Develop secure, research-informed solutions through investigation of technical and business problem domains; and execute projects to improve services and user experiences. |
Self-management | Demonstrate ability to understand and apply ethical standards and work professionally and autonomously to identify processes for continuous improvement; manage projects whilst incorporating professional development needs. |
Approved by Faculty Board 23 September 2021
Course rules
To complete the Graduate Certificate of Cyber Security, students must attain 4 credit points (one year part- time study), which must include the following:
- Four (4) core units (4 credit points)
- Completion of STP050 Academic Integrity (0-credit point compulsory unit)
Students are required to meet the University's academic progress and conduct requirements. Click here for more information.
Course structure
Core
STP050 | Academic Integrity (0 credit points) |
SIT736 | Identity, Access Management and Physical Security |
SIT719 | Analytics for Security and Privacy |
SIT763 | Cyber Security Management |
SIT716 | Computer Networks and Security |
Other course information
Course duration - additional information
Course duration may be affected by delays in completing course requirements, such as accessing or completing work placements.
Further information
Student Central can help you with course planning, choosing the right units and explaining course rules and requirements.
- Contact Student Central