Master of Cyber Security

2017 Deakin University Handbook

Note: You are seeing the 2017 view of this course information. These details may no longer be current. [Go to the current version]
Year

2017 course information

Award granted Master of Cyber Security
Course Map

2017 course map

If you started your course before 2017, please refer to the plan your study page or contact a Student Adviser.

Campus

Offered Cloud (online)

Cloud CampusYes
Duration

1.5 - 2 years full-time or part-time equivalent depending on your entry point

Deakin course codeS734
Approval statusThis course is approved by the University under the Higher Education Standards Framework.
Australian Quality Framework (AQF) recognition

The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9.

INTERNATIONAL STUDENTS – Please note that due to Australian Government regulations, student visas to enter Australia cannot be issued to students who enrol in Deakin’s Cloud Campus.

Course sub-headings

Course overview

In an increasingly digital world, cyber-attacks are an everyday occurrence. Expert cyber security professionals who can protect organisations from these threats are in high demand and this course can prepare you for a successful career anywhere in the world.

Throughout the Master of Cyber Security, you’ll learn how to confront cyber security - one of the 21st Century’s most critical issues. Focusing on a range of studies, you’ll gain knowledge from system security and digital forensics to analytics and organisational security.

This course gives you the cyber security skills that are crucial to the success of our digital future. And, once you graduate, you’ll have the knowledge and talent to take on an expert security role within business, government or law enforcement. 

Indicative student workload

You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.

Career opportunities

Career options are varied, you could work anywhere in the world as a:

  • security analyst
  • project manager
  • security system manager
  • cryptographer
  • consultant
  • security system developer or programmer information security auditor
  • business continuity or IT security engineer.

Pathways

If you have a bachelor’s degree or graduate certificate within the same discipline area, you might be eligible for 4 credit points (units), meaning you’ll only need to complete 12 credit points for this course.

If you complete fewer than 16 credit points for this course, you could exit the course and still graduate with one of the following qualifications:

Fees and charges

Fees and charges vary depending on your course, your fee category and the year you started. To find out about the fees and charges that apply to you, visit the Current students fees website.

Course Learning Outcomes

Deakin Graduate Learning Outcomes

Course Learning Outcomes (CLOs)

1. Discipline-specific knowledge and capabilities: appropriate to the level of study related to a discipline or profession.

  • Develop, evaluate, implement and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice.
  • Design, develop and implement advanced cyber systems and software, and associated policies and procedures for optimal use to withstand emerging attacks/threats in cyber space.

2. Communication: using oral, written and interpersonal communication to inform, motivate and effect change.

  • Communicate effectively in order to design, evaluate and respond to advances in technology, future trends and industry standards and utilise a range of verbal, graphical and written forms, customised for diverse audiences including specialist and non- specialist clients, colleagues and industry personnel.

3. Digital literacy: using technologies to find, use and disseminate information.

  • Utilise a range of digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique and disseminate both technical and professional information.

4. Critical thinking: evaluating information using critical and analytical thinking and judgment.

  • Appraise complex information using critical and analytical thinking and judgement to identify problems, analyse user requirements and propose appropriate and innovative solutions.

5.             Problem solving:  creating solutions to authentic (real world and ill-defined) problems.

  • Generate IT security solutions through the application of specialised theoretical constructs, expert skills and critical analysis to real-world, ill-defined problems to develop appropriate and innovative IT solutions.

6. Self-management: working and learning independently, and taking responsibility for personal actions.

  • Take personal, professional and social responsibility within changing national and international professional IT contexts to develop autonomy as researchers and evaluate own performance for continuing professional development.
  • Work autonomously and responsibly to create solutions to new situations and actively apply knowledge of theoretical constructs and methodologies to make informed decisions.

7.  Teamwork: working and learning with others from different disciplines and backgrounds.

  • Work independently and collaboratively towards achieving the outcomes of a group project, thereby demonstrating interpersonal skills including the ability to brainstorm, negotiate, resolve conflicts, manage difficult and awkward conversations, provide constructive feedback, and demonstrate the ability to function effectively in diverse professional, social and cultural contexts.

8. Global citizenship: engaging ethically and productively in the professional context and with diverse communities and cultures in a global context

  • Engage in professional and ethical behaviour in the design, development and management of IT systems, in the global context, in collaboration with diverse communities and cultures.

Approved by Faculty Board 15 September 2016

Course rules

To complete the Master of Cyber Security, students must attain 16 credit points over 1.5 - 2 years full-time or part-time equivalent depending on your entry point.  Most students choose to study 4 units per trimester, and usually undertake two trimesters each year.

The course comprises a total of 16 credit points, which must include the following:

  • fourteen (14) core units (*which includes 4 foundation units - SIT771, SIT772, SIT773, SIT774)
  • Two (2) level 7 SIT elective units

*Students entering the degree with a related academic or professional background may be eligible for credit transfer and recognition for up to 4 of the foundation units, reducing the full time duration from 2 years to 1.5 years.

Course structure

Core

SIT771Unit description is currently unavailable ^

SIT772Unit description is currently unavailable ^

SIT773Unit description is currently unavailable ^

SIT774Unit description is currently unavailable ^

MIS782Unit description is currently unavailable

SIT719Unit description is currently unavailable

SIT735Unit description is currently unavailable

SIT703Unit description is currently unavailable

SIT704Unit description is currently unavailable

SIT763Unit description is currently unavailable

SIT740Unit description is currently unavailable

SIT764Unit description is currently unavailable

SIT782Unit description is currently unavailable

SIT716Unit description is currently unavailable *

^ SIT771, SIT772, SIT773, and SIT774 are foundations level units.  Students entering the course with a relevant Bachelor’s degree (or equivalent) may be eligible for credit for up to 4 of these units.

* available from 2018

Course structure

Electives

Plus two (2) level 7 SIT course grouped elective units.