Master of Cyber Security

2022 Deakin University Handbook

Note: You are seeing the 2022 view of this course information. These details may no longer be current. [Go to the current version]
Year

2022 course information

Award granted Master of Cyber Security
Course Map

This course map is for new students commencing from Trimester 1 2022. 

This course map is for new students commencing from Trimester 2 2022. 

This course map is for new students commencing from Trimester 3 2022. 

Course maps for commencement in previous years are available on the Course Maps webpage or please contact a Student Adviser in Student Central.

CampusOffered at Waurn Ponds (Geelong)
Cloud CampusYes
Duration

Depending on your professional experience and previous qualifications, your course will be:

  • 1 year full time (2 years part time) – 8 credit points
  • 1.5  years full time (3 years part time) – 12 credit points
  • 2 years full time (4 years part time) – 16 credit points
CRICOS course code093941G Waurn Ponds (Geelong)
Deakin course codeS734
Approval status

This course is approved by the University under the Higher Education Standards Framework.

Australian Qualifications Framework (AQF) recognition

The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9.

Course sub-headings

Course overview

In an increasingly digital world, cyber attacks are an everyday occurrence. As a result, cyber security professionals are in high demand around the world to protect organisations in all sectors from increasingly sophisticated cyber threats. Deakin’s Master of Cyber Security equips you with the specialised skills to investigate and combat cyber crime, and prepares you for a successful career in cyber security anywhere in the world.

Throughout the Master of Cyber Security, you will learn how to detect, analyse and confront cyber security challenges. You’ll focus on a range of studies, and gain knowledge about system security and digital forensics, analytics, organisational security and human aspects of cyber security. This vital experience prepares you to counter the number one criminal threat to modern-day society.

Ready to take on an expert security role within business, government or law enforcement?

Deakin’s Master of Cyber Security gives you the skills required to effectively and strategically respond to cyber security challenges from both a technical and organisational perspective. You will gain a solid understanding of cyber security concepts and industry practices, as well as the techniques and tools available to prevent and mitigate cyber security threats.

With access to current state-of-the-art software and hardware throughout the course, you’ll learn about digital forensics, security and privacy issues in analytics and network security. Through vital hands-on experience, you’ll gain the technical skills required to confidently investigate and combat cyber crime and cyberterrorism.

You’ll graduate ready for a variety of security roles within business, government and law enforcement. Examples include risk analyst, information security specialist, security system developer or programmer, cyber security consultant, security systems manager, cryptographer, security consultant, information security auditor or security manager. And with experience, you might take on roles such as chief security officer.

Indicative student workload

You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.

Professional recognition

The Master of Cyber Security is professionally accredited with the Australian Computer Society (ACS).

Career opportunities

Career options are varied, you could work anywhere in the world as a:

  • security analyst
  • project manager
  • security system manager
  • cryptographer
  • consultant
  • security system developer or programmer information security auditor
  • business continuity or IT security engineer.

Participation requirements

Elective units may be selected that include compulsory placements, work-based training, community-based learning or collaborative research training arrangements.

Reasonable adjustments to participation and other course requirements will be made for students with a disability. Click here for more information.

Mandatory student checks

Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.

Pathways

Pathways for students to enter the Master of Cyber Security are as follows:

Pathway options will depend on your professional experience and previous qualifications.

 

Alternative exits

Graduate Certificate of Cyber Security (S535)
Graduate Certificate of Information Technology (S578)
Graduate Diploma of Cyber Security (S635)

Fees and charges

Fees and charges vary depending on your course, the type of fee place you hold, your commencement year, the units you choose and your study load. To find out about the fees and charges that apply to you, visit the Current students fees website or our handy Fee estimator to help estimate your tuition fees.

Tuition fees increase at the beginning of each calendar year and all fees quoted are in Australian dollars ($AUD). Tuition fees do not include textbooks, computer equipment or software, other equipment or costs such as photocopying or travel.

Course Learning Outcomes

Deakin Graduate Learning Outcomes

Course Learning Outcomes

Discipline-specific knowledge and capabilities

Develop specialised and essential knowledge of security needs for design and development of secure systems, processes, concepts, and technologies; to develop software systems, products and solutions that automate business processes at par with benchmarks and industry standards and based on evolving cyber security needs.

Develop extended knowledge in the development and use of techniques, systems and approaches for secure communication and the systematic analysis of systems for features related to cyber security.

Communication

Communicate effectively to design, evaluate, and respond to advances in technology in the cyber security context, future trends and industry standards and utilise a range of verbal, graphical and written forms, customised for diverse audiences including specialist and non- specialist.

Digital literacy

Utilise a range of digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique, and disseminate both technical and professional information in the context of cyber security.

Critical thinking

Appraise complex information using critical and analytical thinking and judgement to identify problems, analyse user requirements and propose appropriate and innovative cybersecurity solutions.

Problem solving

Generate cyber security solutions through the application of specialised theoretical constructs, expert skills, and critical analysis to real-world, ill-defined problems to develop appropriate and innovative cyber security solutions.

Self-management

Take personal, professional, and social responsibility within changing national and international professional IT and cybersecurity contexts; to develop autonomy as researchers and evaluate own performance for continuing professional development.

Work autonomously and responsibly to create cyber security solutions to new situations and actively apply knowledge of theoretical constructs and methodologies to make informed decisions.

Teamwork

Work independently and collaboratively towards achieving the outcomes of a group project, thereby demonstrating interpersonal skills including the ability to brainstorm, negotiate, resolve conflicts, manage difficult and awkward conversations, provide constructive feedback, and demonstrate the ability to function effectively in diverse professional, social and cultural contexts.

Approved by Faculty Board 23 September 2021.

Course rules

To complete the Master of Cyber Security, you will complete 8, 12 or 16 credit points, depending on your prior experience.

The course is structured in three parts:

  • Part A. Foundation Information Technology Studies (4 credit points),
  • Part B. Introductory Cyber Security Studies (4 credit points), and
  • Part C. Mastery Cyber Security Studies (8 credit points).

Depending upon prior qualifications and/or experience, you may receive credit for Parts A and B.

Students are required to meet the University's academic progress and conduct requirements. Click here for more information.

Course structure

Core

Mandatory unit for all entry levels

STP050Academic Integrity (0 credit points)

Part A: Foundation Information Technology Studies

SIT771Object-Oriented Development

SIT772Database and Information Retrieval

SIT773Software Requirements Analysis and Modelling

SIT774Web Technologies and Development

Part B: Introductory Cyber Security Studies

SIT736Identity, Access Management and Physical Security

SIT719Analytics for Security and Privacy

SIT763Cyber Security Management

SIT716Computer Networks and Security

Part C: Mastery Cyber Security Studies

SIT735Application and Communication Protocol Security

SIT703Advanced Digital Forensics

SIT704Ethical Hacking

SIT738Secure Coding

SIT764Team Project (A) - Project Management and Practices ~

SIT782Team Project (B) - Execution and Delivery ~

 

~ Note: Students are expected to undertake SIT764 and SIT782 in consecutive trimesters. Students should seek advice from the unit chair if they are unable to complete SIT764 and SIT782 consecutively.

Electives

Plus two (2) level 7 SIT-coded elective units (two credit points).


Other course information

Course duration - additional information

Course duration may be affected by delays in completing course requirements, such as accessing or completing work placements.

Further information

Student Central can help you with course planning, choosing the right units and explaining course rules and requirements.