Master of Cyber Security
2023 Deakin University Handbook
Year | 2023 course information |
---|---|
Award granted | Master of Cyber Security |
Course Map | The course map for new students commencing from Trimester 1 2023. The course map for new students commencing from Trimester 2 2023. The course map for new students commencing from Trimester 3 2023. Course maps for commencement in previous years are available on the Course Maps webpage or please contact a Student Adviser in Student Central. |
Campus | Offered at Waurn Ponds (Geelong) |
Online | Yes |
Duration | Depending on your professional experience and previous qualifications, your course will be:
|
CRICOS course code | 093941G Waurn Ponds (Geelong) |
Deakin course code | S734 |
Approval status | This course is approved by the University under the Higher Education Standards Framework. |
Australian Qualifications Framework (AQF) recognition | The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9. |
Course sub-headings
- Course overview
- Indicative student workload
- Professional recognition
- Career opportunities
- Participation requirements
- Mandatory student checks
- Pathways
- Alternative exits
- Fees and charges
- Course Learning Outcomes
- Course rules
- Course structure
Course overview
In an increasingly digital world, cyber attacks are an everyday occurrence. As a result, cyber security professionals are in high demand around the world to protect organisations in all sectors from increasingly sophisticated cyber threats. Deakin’s Master of Cyber Security equips you with the specialised skills to investigate and combat cyber crime, and prepares you for a successful career in cyber security anywhere in the world.
Throughout the Master of Cyber Security, you will learn how to detect, analyse and confront cyber security challenges. You’ll focus on a range of studies, and gain knowledge about system security and digital forensics, analytics, organisational security and human aspects of cyber security. This vital experience prepares you to counter the number one criminal threat to modern-day society.
Ready to take on an expert security role within business, government or law enforcement?
Deakin’s Master of Cyber Security gives you the skills required to effectively and strategically respond to cyber security challenges from both a technical and organisational perspective. You will gain a solid understanding of cyber security concepts and industry practices, as well as the techniques and tools available to prevent and mitigate cyber security threats.
With access to current state-of-the-art software and hardware throughout the course, you’ll learn about digital forensics, security and privacy issues in analytics and network security. Through vital hands-on experience, you’ll gain the technical skills required to confidently investigate and combat cyber crime and cyberterrorism.
You’ll graduate ready for a variety of security roles within business, government and law enforcement. Examples include risk analyst, information security specialist, security system developer or programmer, cyber security consultant, security systems manager, cryptographer, security consultant, information security auditor or security manager. And with experience, you might take on roles such as chief security officer.
Indicative student workload
You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.
Professional recognition
The Master of Cyber Security is professionally accredited with the Australian Computer Society (ACS).
Career opportunities
Career options are varied, you could work anywhere in the world as a:
- security analyst
- project manager
- security system manager
- consultant
- security system developer or programmer information security auditor
- business continuity or IT security engineer.
Participation requirements
Elective units may be selected that include compulsory placements, work-based training, community-based learning or collaborative research training arrangements.
Reasonable adjustments to participation and other course requirements will be made for students with a disability. More information available at Disability support services.
Mandatory student checks
Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.
Pathways
Pathways for students to enter the Master of Cyber Security are as follows:
- Option 1: Graduate Certificate of Information Technology (S578) (followed by a 12 credit point Master of Cyber Security)
- Option 2: Graduate Certificate of Cyber Security (S535) (followed by an 8 credit point Master of Cyber Security)
Pathway options will depend on your professional experience and previous qualifications.
Alternative exits
Graduate Certificate of Cyber Security (S535) | |
Graduate Certificate of Information Technology (S578) | |
Graduate Diploma of Cyber Security (S635) |
Fees and charges
Fees and charges vary depending on your course, the type of fee place you hold, your commencement year, the units you choose and your study load.
Tuition fees increase at the beginning of each calendar year and all fees quoted are in Australian dollars ($AUD). Tuition fees do not include textbooks, computer equipment or software, other equipment or costs such as mandatory checks, travel and stationery.
Use the Fee estimator to see course and unit fees applicable to your course and type of place. Further information regarding tuition fees, other fees and charges, invoice due dates, withdrawal dates, payment methods is available on our Current students fees website.
Course Learning Outcomes
Deakin Graduate Learning Outcomes | Course Learning Outcomes |
Discipline-specific knowledge and capabilities | Develop specialised and essential knowledge of security needs for design and development of secure systems, processes, concepts, and technologies; to develop software systems, products and solutions that automate business processes at par with benchmarks and industry standards and based on evolving cyber security needs. Develop extended knowledge in the development and use of techniques, systems and approaches for secure communication and the systematic analysis of systems for features related to cyber security. |
Communication | Communicate effectively to design, evaluate, and respond to advances in technology in the cyber security context, future trends and industry standards and utilise a range of verbal, graphical and written forms, customised for diverse audiences including specialist and non- specialist. |
Digital literacy | Utilise a range of digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique, and disseminate both technical and professional information in the context of cyber security. |
Critical thinking | Appraise complex information using critical and analytical thinking and judgement to identify problems, analyse user requirements and propose appropriate and innovative cybersecurity solutions. |
Problem solving | Generate cyber security solutions through the application of specialised theoretical constructs, expert skills, and critical analysis to real-world, ill-defined problems to develop appropriate and innovative cyber security solutions. |
Self-management | Take personal, professional, and social responsibility within changing national and international professional IT and cybersecurity contexts; to develop autonomy as researchers and evaluate own performance for continuing professional development. Work autonomously and responsibly to create cyber security solutions to new situations and actively apply knowledge of theoretical constructs and methodologies to make informed decisions. |
Teamwork | Work independently and collaboratively towards achieving the outcomes of a group project, thereby demonstrating interpersonal skills including the ability to brainstorm, negotiate, resolve conflicts, manage difficult and awkward conversations, provide constructive feedback, and demonstrate the ability to function effectively in diverse professional, social and cultural contexts. |
Approved by Faculty Board 23 September 2021.
Course rules
To complete the Master of Cyber Security, you will complete 8, 12 or 16 credit points, depending on your prior experience.
The course is structured in three parts:
- Part A. Foundation Information Technology Studies (4 credit points),
- Part B. Mastery Cyber Security Studies (8 credit points), and
- Part C. Cyber Security capstone units (4 credit points).
Depending upon prior qualifications and/or experience, you may receive credit for Parts A and B.
Students are required to meet the University's academic progress and conduct requirements.
Course structure
Core
Mandatory unit for all entry levels
STP050 | Academic Integrity (0 credit points) |
Part A: Foundation Information Technology Studies
SIT771 | Object-Oriented Development |
SIT772 | Database Fundamentals |
SIT773 | Software Requirements Analysis and Modelling |
SIT774 | Web Technologies and Development |
Part B: Mastery Cyber Security Studies
SIT736 | Identity, Access Management and Physical Security |
SIT719 | Analytics for Security and Privacy |
SIT763 | Cyber Security Management |
SIT716 | Computer Networks and Security |
SIT735 | Application and Communication Protocol Security |
SIT703 | Computer Forensics and Investigations |
SIT704 | Ethical Hacking |
SIT738 | Secure Coding |
Part C: Cyber Security capstone units
SIT753 | Professional Practice in Information Technology |
SIT764 | Team Project (A) - Project Management and Practices ~ |
SIT782 | Team Project (B) - Execution and Delivery ~ |
Plus one (1) level 7 SIT-coded elective unit (one credit point).
~ Note: Students are expected to undertake SIT764 and SIT782 in consecutive trimesters. Students should seek advice from the unit chair if they are unable to complete SIT764 and SIT782 consecutively.
Other course information
Course duration - additional information
Course duration may be affected by delays in completing course requirements, such as accessing or completing work placements.
Further information
Student Central can help you with course planning, choosing the right units and explaining course rules and requirements.
- Contact Student Central