Master of Cyber Security
2018 Deakin University Handbook
Year | 2018 course information |
---|---|
Award granted | Master of Cyber Security |
Course Map | If you started your course before 2018, please refer to the plan your study page or contact a Student Adviser. |
Campus | Cloud (online) |
Cloud Campus | No |
Duration | 1.5 - 2 years full-time or part-time equivalent depending on your entry point |
Deakin course code | S734 |
Approval status | This course is approved by the University under the Higher Education Standards Framework. |
Australian Qualifications Framework (AQF) recognition | The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9. |
INTERNATIONAL STUDENTS – Please note that due to Australian Government regulations, student visas to enter Australia cannot be issued to students who enrol in Deakin’s Cloud Campus. |
Course sub-headings
- Course overview
- Indicative student workload
- Career opportunities
- Participation requirements
- Mandatory student checks
- Pathways
- Fees and charges
- Course Learning Outcomes
- Course rules
- Course structure
- Research and research-related study
Course overview
In an increasingly digital world, cyber-attacks are an everyday occurrence. Expert cyber security professionals who can protect organisations from these threats are in high demand and this course can prepare you for a successful career anywhere in the world.
Throughout the Master of Cyber Security, you’ll learn how to confront cyber security - one of the 21st Century’s most critical issues. Focusing on a range of studies, you’ll gain knowledge from system security and digital forensics to analytics and organisational security.
This course gives you the cyber security skills that are crucial to the success of our digital future. And, once you graduate, you’ll have the knowledge and talent to take on an expert security role within business, government or law enforcement.
Indicative student workload
You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.
Career opportunities
Career options are varied, you could work anywhere in the world as a:
- security analyst
- project manager
- security system manager
- cryptographer
- consultant
- security system developer or programmer information security auditor
- business continuity or IT security engineer.
Participation requirements
Elective units may be selected that include compulsory placements, work-based training, community-based learning or collaborative research training arrangements.
Reasonable adjustments to participation and other course requirements will be made for students with a disability. Click here for more information.
Mandatory student checks
Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.
Pathways
If you have a bachelor’s degree or graduate certificate within the same discipline area, you might be eligible for 4 credit points (units), meaning you’ll only need to complete 12 credit points for this course.
If you complete fewer than 16 credit points for this course, you could exit the course and still graduate with one of the following qualifications:
Attendance requirements
Elective units may be selected that may include compulsory placement, study tours, work-based training or collaborative research training arrangements.
Fees and charges
Fees and charges vary depending on your course, your fee category and the year you started. To find out about the fees and charges that apply to you, visit the Current students fees website.
Course Learning Outcomes
Deakin Graduate Learning Outcomes | Course Learning Outcomes |
Discipline-specific knowledge and capabilities | Develop, evaluate, implement and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice. Design, develop and implement advanced cyber systems and software, and associated policies and procedures for optimal use to withstand emerging attacks/threats in cyber space. |
Communication | Communicate effectively in order to design, evaluate and respond to advances in technology, future trends and industry standards and utilise a range of verbal, graphical and written forms, customised for diverse audiences including specialist and non- specialist clients, colleagues and industry personnel. |
Digital literacy | Utilise a range of digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique and disseminate both technical and professional information. |
Critical thinking | Appraise complex information using critical and analytical thinking and judgement to identify problems, analyse user requirements and propose appropriate and innovative solutions. |
Problem solving | Generate IT security solutions through the application of specialised theoretical constructs, expert skills and critical analysis to real-world, ill-defined problems to develop appropriate and innovative IT solutions. |
Self-management | Take personal, professional and social responsibility within changing national and international professional IT contexts to develop autonomy as researchers and evaluate own performance for continuing professional development. Work autonomously and responsibly to create solutions to new situations and actively apply knowledge of theoretical constructs and methodologies to make informed decisions. |
Teamwork | Work independently and collaboratively towards achieving the outcomes of a group project, thereby demonstrating interpersonal skills including the ability to brainstorm, negotiate, resolve conflicts, manage difficult and awkward conversations, provide constructive feedback, and demonstrate the ability to function effectively in diverse professional, social and cultural contexts. |
Global citizenship | Engage in professional and ethical behaviour in the design, development and management of IT systems, in the global context, in collaboration with diverse communities and cultures. |
Approved by Faculty Board 27 July 2017
Course rules
To complete the Master of Cyber Security, students must attain 16 credit points over 1.5 - 2 years full-time or part-time equivalent depending on your entry point. Most students choose to study 4 units per trimester, and usually undertake two trimesters each year.
The course comprises a total of 16 credit points, which must include the following:
- Completion of STP050 Academic Integrity (0-credit-point compulsory unit)
- Fourteen (14) core units (*which includes 4 foundation units - SIT771, SIT772, SIT773, SIT774)
- Two (2) level 7 SIT elective units
*Students entering the degree with a related academic or professional background may be eligible for credit transfer and recognition for up to 4 of the foundation units, reducing the full time duration from 2 years to 1.5 years.
Students are required to meet the University's academic progress and conduct requirements. Click here for more information.Course structure
Core
STP050 | Unit description is currently unavailable (0 credit points) |
SIT771 | Unit description is currently unavailable ^ |
SIT772 | Unit description is currently unavailable ^ |
SIT773 | Unit description is currently unavailable ^ |
SIT774 | Unit description is currently unavailable ^ |
MIS782 | Unit description is currently unavailable |
SIT719 | Unit description is currently unavailable |
SIT735 | Unit description is currently unavailable |
SIT703 | Unit description is currently unavailable |
SIT704 | Unit description is currently unavailable |
SIT763 | Unit description is currently unavailable |
SIT740 | Unit description is currently unavailable |
SIT764 | Unit description is currently unavailable |
SIT782 | Unit description is currently unavailable |
SIT716 | Unit description is currently unavailable |
^ SIT771, SIT772, SIT773, and SIT774 are foundations level units. Students entering the course with a relevant Bachelor’s degree (or equivalent) may be eligible for credit for up to 4 of these units.
Course structure
Electives
Plus two (2) level 7 SIT course grouped elective units.
Other course information
Course duration - additional information
Course duration may be affected by delays in completing course requirements, such as accessing or completing work placements.
Research and research-related study
You will have the opportunity to be involved with and develop a small-scale research project in Research and Development in Information Technology (SIT740). This unit introduces IT methodology and problem-solving processes, from conception to deployed systems and critically examine digital ethics to understand the ethical challenges that IT Research and Development can raise.