Master of Cyber Security
2020 Deakin University Handbook
Year | 2020 course information |
---|---|
Award granted | Master of Cyber Security |
Course Map | If you started your course before 2020, please refer to the plan your study page or contact a Student Adviser |
Campus | Offered at Waurn Ponds (Geelong) |
Cloud Campus | Yes |
Duration | Depending on your professional experience and previous qualifications, your course will be:
|
CRICOS course code | 093941G Waurn Ponds (Geelong) |
Deakin course code | S734 |
Approval status | This course is approved by the University under the Higher Education Standards Framework. |
Australian Qualifications Framework (AQF) recognition | The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9. |
Course sub-headings
- Course overview
- Indicative student workload
- Career opportunities
- Participation requirements
- Mandatory student checks
- Pathways
- Alternative exits
- Fees and charges
- Course Learning Outcomes
- Course rules
- Course structure
Course overview
In an increasingly digital world, cyber-attacks are an everyday occurrence. Cyber security professionals are employed to protect organisations from these cyber threats and are in high demand globally. This course can prepare you for a successful career in cyber security anywhere in the world.
Throughout the Master of Cyber Security, you will learn how to detect, analyse and confront cyber security challenges. You will focus on a range of studies, and gain knowledge about system security and digital forensics, analytics, organisational security and human aspects of cyber security.
This course gives you the cyber security skills that are crucial to the success of our digital future. And, once you graduate, you’ll have the knowledge and talent to take on an expert security role within business, government or law enforcement.
Indicative student workload
You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.
Career opportunities
Career options are varied, you could work anywhere in the world as a:
- security analyst
- project manager
- security system manager
- cryptographer
- consultant
- security system developer or programmer information security auditor
- business continuity or IT security engineer.
Participation requirements
Elective units may be selected that include compulsory placements, work-based training, community-based learning or collaborative research training arrangements.
Reasonable adjustments to participation and other course requirements will be made for students with a disability. Click here for more information.
Mandatory student checks
Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.
Pathways
Pathways for students to enter the Master of Cyber Security are as follows:
- Option 1: Graduate Certificate of Information Technology (S578) (followed by a 12 credit point Master of Cyber Security)
- Option 2: Graduate Certificate of Cyber Security (S535) (followed by an 8 credit point Master of Cyber Security)
Pathway options will depend on your professional experience and previous qualifications.
Alternative exits
Graduate Certificate of Cyber Security (S535) | |
Graduate Certificate of Information Technology (S578) | |
Graduate Diploma of Cyber Security (S635) |
Fees and charges
Fees and charges vary depending on your course, your fee category and the year you started. To find out about the fees and charges that apply to you, visit the Current students fees website.
Course Learning Outcomes
Deakin Graduate Learning Outcomes | Course Learning Outcomes |
Discipline-specific knowledge and capabilities | Develop, evaluate, implement and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice. Design, develop and implement advanced cyber systems and software, and associated policies and procedures for optimal use to withstand emerging attacks/threats in cyber space. |
Communication | Communicate effectively in order to design, evaluate and respond to advances in technology, future trends and industry standards and utilise a range of verbal, graphical and written forms, customised for diverse audiences including specialist and non- specialist clients, colleagues and industry personnel. |
Digital literacy | Utilise a range of digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique and disseminate both technical and professional information. |
Critical thinking | Appraise complex information using critical and analytical thinking and judgement to identify problems, analyse user requirements and propose appropriate and innovative solutions. |
Problem solving | Generate IT security solutions through the application of specialised theoretical constructs, expert skills and critical analysis to real-world, ill-defined problems to develop appropriate and innovative IT solutions. |
Self-management | Take personal, professional and social responsibility within changing national and international professional IT contexts to develop autonomy as researchers and evaluate own performance for continuing professional development. Work autonomously and responsibly to create solutions to new situations and actively apply knowledge of theoretical constructs and methodologies to make informed decisions. |
Teamwork | Work independently and collaboratively towards achieving the outcomes of a group project, thereby demonstrating interpersonal skills including the ability to brainstorm, negotiate, resolve conflicts, manage difficult and awkward conversations, provide constructive feedback, and demonstrate the ability to function effectively in diverse professional, social and cultural contexts. |
Global citizenship | Engage in professional and ethical behaviour in the design, development and management of IT systems, in the global context, in collaboration with diverse communities and cultures. |
Approved by Faculty Board 27 June 2019
Course rules
To complete the Master of Cyber Security, you will complete 8, 12 or 16 credit points, depending on your prior experience.
The course is structured in three parts:
- Part A. Fundamental Information Technology Studies (4 credit points),
- Part B. Introductory Cyber Security Studies (4 credit points), and
- Part C. Mastery Cyber Security Studies (8 credit points).
Depending upon prior qualifications and/or experience, you may receive credit for Parts A and B.
Students are required to meet the University's academic progress and conduct requirements. Click here for more information.
Course structure
Electives
Plus two (2) level 7 SIT-coded elective units.
Course structure
Core
Mandatory unit for all entry levels
STP050 | Academic Integrity (0 credit points) |
Part A: Fundamental Information Technology Studies
SIT771 | Object-Oriented Development |
SIT772 | Database and Information Retrieval |
SIT773 | Software Requirements Analysis and Modelling |
SIT774 | Web Technologies and Development |
Part B: Introductory Cyber Security Studies
MIS782 | Value of Information |
SIT719 | Security and Privacy Issues in Analytics |
SIT763 | Cyber Security Management |
SIT716 | Computer Networks and Security |
Part C: Mastery Cyber Security Studies
SIT735 | Communications Network Security |
SIT703 | Advanced Digital Forensics |
SIT704 | Advanced Topics in Digital Security |
SIT740 | Research and Development in Information Technology |
SIT764 | Team Project (A) - Project Management and Practices ~ |
SIT782 | Team Project (B) - Execution and Delivery ~ |
~ Note: Students are expected to undertake SIT764 and SIT782 in consecutive trimesters. Students should seek advice from the unit chair if they are unable to complete SIT764 and SIT782 consecutively.
Other course information
Course duration - additional information
Course duration may be affected by delays in completing course requirements, such as accessing or completing work placements.
Further information
Student Central can help you with course planning, choosing the right units and explaining course rules and requirements.
- Contact Student Central