Master of Cyber Security

2018 Deakin University Handbook

Note: You are seeing the 2018 view of this course information. These details may no longer be current. [Go to the current version]
Year2018 course information
Award granted Master of Cyber Security
Course Map

2018 course map

If you started your course before 2018, please refer to the plan your study page or contact a Student Adviser.

Campus

Cloud (online)

Cloud CampusNo
Duration

1.5 - 2 years full-time or part-time equivalent depending on your entry point

Deakin course codeS734
Approval statusThis course is approved by the University under the Higher Education Standards Framework.
Australian Qualifications Framework (AQF) recognition

The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9.

INTERNATIONAL STUDENTS – Please note that due to Australian Government regulations, student visas to enter Australia cannot be issued to students who enrol in Deakin’s Cloud Campus.

Course sub-headings

Course overview

In an increasingly digital world, cyber-attacks are an everyday occurrence. Expert cyber security professionals who can protect organisations from these threats are in high demand and this course can prepare you for a successful career anywhere in the world.

Throughout the Master of Cyber Security, you’ll learn how to confront cyber security - one of the 21st Century’s most critical issues. Focusing on a range of studies, you’ll gain knowledge from system security and digital forensics to analytics and organisational security.

This course gives you the cyber security skills that are crucial to the success of our digital future. And, once you graduate, you’ll have the knowledge and talent to take on an expert security role within business, government or law enforcement. 

Indicative student workload

You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.

Career opportunities

Career options are varied, you could work anywhere in the world as a:

  • security analyst
  • project manager
  • security system manager
  • cryptographer
  • consultant
  • security system developer or programmer information security auditor
  • business continuity or IT security engineer.

Participation requirements

Elective units may be selected that include compulsory placements, work-based training, community-based learning or collaborative research training arrangements.

Reasonable adjustments to participation and other course requirements will be made for students with a disability. Click here for more information.

Mandatory student checks

Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.

Pathways

If you have a bachelor’s degree or graduate certificate within the same discipline area, you might be eligible for 4 credit points (units), meaning you’ll only need to complete 12 credit points for this course.

If you complete fewer than 16 credit points for this course, you could exit the course and still graduate with one of the following qualifications:


Attendance requirements

Elective units may be selected that may include compulsory placement, study tours, work-based training or collaborative research training arrangements.

Fees and charges

Fees and charges vary depending on your course, your fee category and the year you started. To find out about the fees and charges that apply to you, visit the Current students fees website.

Course Learning Outcomes

Deakin Graduate Learning Outcomes

Course Learning Outcomes

Discipline-specific knowledge and capabilities

Develop, evaluate, implement and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice.  Design, develop and implement advanced cyber systems and software, and associated policies and procedures for optimal use to withstand emerging attacks/threats in cyber space.

Communication

Communicate effectively in order to design, evaluate and respond to advances in technology, future trends and industry standards and utilise a range of verbal, graphical and written forms, customised for diverse audiences including specialist and non- specialist clients, colleagues and industry personnel.

Digital literacy

Utilise a range of digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique and disseminate both technical and professional information.

Critical thinking

Appraise complex information using critical and analytical thinking and judgement to identify problems, analyse user requirements and propose appropriate and innovative solutions.

Problem solving

Generate IT security solutions through the application of specialised theoretical constructs, expert skills and critical analysis to real-world, ill-defined problems to develop appropriate and innovative IT solutions.

Self-management

Take personal, professional and social responsibility within changing national and international professional IT contexts to develop autonomy as researchers and evaluate own performance for continuing professional development.  Work autonomously and responsibly to create solutions to new situations and actively apply knowledge of theoretical constructs and methodologies to make informed decisions.

Teamwork

Work independently and collaboratively towards achieving the outcomes of a group project, thereby demonstrating interpersonal skills including the ability to brainstorm, negotiate, resolve conflicts, manage difficult and awkward conversations, provide constructive feedback, and demonstrate the ability to function effectively in diverse professional, social and cultural contexts.

Global citizenship

Engage in professional and ethical behaviour in the design, development and management of IT systems, in the global context, in collaboration with diverse communities and cultures.

Approved by Faculty Board 27 July 2017

Course rules

To complete the Master of Cyber Security, students must attain 16 credit points over 1.5 - 2 years full-time or part-time equivalent depending on your entry point.  Most students choose to study 4 units per trimester, and usually undertake two trimesters each year.

The course comprises a total of 16 credit points, which must include the following:

  • Completion of STP050 Academic Integrity (0-credit-point compulsory unit)
  • Fourteen (14) core units (*which includes 4 foundation units - SIT771, SIT772, SIT773, SIT774)
  • Two (2) level 7 SIT elective units

*Students entering the degree with a related academic or professional background may be eligible for credit transfer and recognition for up to 4 of the foundation units, reducing the full time duration from 2 years to 1.5 years.

Students are required to meet the University's academic progress and conduct requirements. Click here for more information.

Course structure

Core

STP050Unit description is currently unavailable (0 credit points)

SIT771Unit description is currently unavailable ^

SIT772Unit description is currently unavailable ^

SIT773Unit description is currently unavailable ^

SIT774Unit description is currently unavailable ^

MIS782Unit description is currently unavailable

SIT719Unit description is currently unavailable

SIT735Unit description is currently unavailable

SIT703Unit description is currently unavailable

SIT704Unit description is currently unavailable

SIT763Unit description is currently unavailable

SIT740Unit description is currently unavailable

SIT764Unit description is currently unavailable

SIT782Unit description is currently unavailable

SIT716Unit description is currently unavailable

^ SIT771, SIT772, SIT773, and SIT774 are foundations level units.  Students entering the course with a relevant Bachelor’s degree (or equivalent) may be eligible for credit for up to 4 of these units.

Course structure

Electives

Plus two (2) level 7 SIT course grouped elective units.


Other course information

Course duration - additional information

Course duration may be affected by delays in completing course requirements, such as accessing or completing work placements.

Research and research-related study

You will have the opportunity to be involved with and develop a small-scale research project in Research and Development in Information Technology (SIT740).  This unit introduces IT methodology and problem-solving processes, from conception to deployed systems and critically examine digital ethics to understand the ethical challenges that IT Research and Development can raise.