Master of Cyber Security
2025 Deakin University Handbook
Year | 2025 course information |
---|---|
Award granted | Master of Cyber Security |
Deakin course code | S734 |
Faculty | Faculty of Science, Engineering and Built Environment |
Campus | Offered at Waurn Ponds (Geelong) |
Online | Yes |
Duration | 2 years full-time or part-time equivalent. Depending on your professional experience and previous qualifications, you may be eligible for credit which could reduce your course duration. |
Course Map - enrolment planning tool | The course map for new students commencing from Trimester 1 2025. Course maps for commencement in previous years are available on the Course Maps webpage or please contact a Student Adviser in Student Central. |
CRICOS course code | 093941G Waurn Ponds (Geelong) |
Australian Qualifications Framework (AQF) recognition | The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9 |
Course sub-headings
- Course overview
- Indicative student workload
- Professional recognition
- Career opportunities
- Participation requirements
- Mandatory student checks
- Pathways
- Alternative exits
- Course Learning Outcomes
- Course rules
- Course structure
- Work experience
- Fees and charges
Course overview
In an increasingly digital world, cyber-attacks are an everyday occurrence. As a result, cyber security professionals are in high demand globally to protect organisations in all sectors from increasingly sophisticated cyber threats. Deakin’s Master of Cyber Security equips you with the specialised skills to investigate and combat cyber-crime, preparing you for a successful career in cyber security anywhere in the world.
Throughout the Master of Cyber Security, you will learn how to detect, analyse and confront cyber security challenges. You will focus on a range of studies and gain knowledge about system security and digital forensics, analytics, organisational security, and human aspects of cyber security. This vital experience prepares you to counter the number one criminal threat to modern-day society.
Graduate with the skills needed to thrive in a booming industry armed with a degree ranked in the top 1% globally for computer science and systems*.
Ready to take on an expert security role within business, government or law enforcement?
Deakin’s Master of Cyber Security gives you the skills required to effectively and strategically respond to cyber security challenges from both a technical and organisational perspective. You will gain a solid understanding of cyber security concepts and industry practices, as well as the techniques and tools available to prevent and mitigate cyber security threats.
With access to current state-of-the-art software and hardware throughout the course, you will learn about digital forensics, security and privacy issues in analytics and network security. Through vital hands-on experience, you will gain the technical skills required to confidently investigate and combat cyber crime and cyberterrorism.
You will graduate ready for a variety of security roles within business, government and law enforcement. Examples include risk analyst, information security specialist, security system developer or programmer, cyber security consultant, security systems manager, security consultant, information security auditor or security manager. Combined with experience, you could take on roles such as chief security officer.
*2022 ShanghaiRankings Global Ranking of Academic Subjects
Indicative student workload
You can expect to participate in a range of teaching activities each week. This could include lectures, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.
Professional recognition
The Master of Cyber Security is professionally accredited with the Australian Computer Society (ACS).
Career opportunities
The rapid growth of cybercrime has created unparalleled opportunities for those with cyber security expertise. Jobs in the Database and Systems Administrators & ICT Security sector are predicted to increase by 38.9% by November 2026*.
Cyber security is not just limited to the realm of Information Technology (IT). It exists in health, science, automative, agriculture, and much more. Other areas might include government, military, banking, telecommunications, and retail. Wherever digital information is present, there is a need for specialists to combat cybercrime and cyber terrorism. After completing this course, you will have the skills to carve out your niche in an ever-evolving landscape.
Career options are varied, allowing you to work anywhere in the world as a:
- business continuity or IT security engineer
- incident response analyst
- information security auditor
- security system manager
- security consultant
- security system developer or programmer
- operations support analyst
- penetration tester
- security operations manager
- infrastructure specialist
- security operations centre (SOC) analyst
- security architect.
*Jobs and Skills Australia, 2021 Employment projections for the five years to 2026.
Participation requirements
Elective units may be selected that include compulsory placements, work-based training, community-based learning or collaborative research training arrangements.
Reasonable adjustments to participation and other course requirements will be made for students with a disability. More information available at Disability support services.
Mandatory student checks
Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.
Pathways
Pathways for students to enter the Master of Cyber Security are as follows:
- Graduate Certificate of Information Technology (S578), followed by a 12 credit point Master of Cyber Security
- Graduate Certificate of Information Technology (S578) and Graduate Certificate of Cyber Security (S535), followed by an 8 credit point Master of Cyber Security.
Pathway options will depend on your professional experience and previous qualifications.
Alternative exits
Graduate Certificate of Cyber Security (S535) | |
Graduate Certificate of Information Technology (S578) | |
Graduate Diploma of Cyber Security (S635) |
Course Learning Outcomes
Deakin Graduate Learning Outcomes | Course Learning Outcomes |
---|---|
Discipline-specific knowledge and capabilities | Develop specialised and essential knowledge of security needs for design and development of secure systems, processes, concepts, and technologies; to develop software systems, products and solutions that automate business processes at par with benchmarks and industry standards and based on evolving cyber security needs. Develop extended knowledge in the development and use of techniques, systems and approaches for secure communication and the systematic analysis of systems for features related to cyber security. |
Communication | Communicate in professional and other contexts to inform, explain and drive sustainable innovation through cyber security and to motivate and effect change by drawing upon advances in technology, future trends and industry standards, and by utilising a range of verbal, graphical and written methods, recognising the needs of diverse audiences including specialist and non-specialist clients, industry personnel and other stakeholders. |
Digital literacy | Identify, evaluate, select and use digital technologies, platforms, frameworks, and tools from the field of cyber security to generate, manage, process and share digital resources and justify digital tools selection to influence others. |
Critical thinking | Questions assumptions and seeks to uncover inconsistencies and ambiguities in information and judgements, critically evaluates their sources and rationales, to inform and justify decision making in the field of cyber security. |
Problem solving | Apply expert, specialised cognitive, technical, and creative skills from cyber security to understand requirements and design, implement, operate, and evaluate solutions to complex real-world and ill-defined computing problems. |
Self-management | Apply reflective practice and work independently to apply knowledge and skills in a professional manner to complex situations and ongoing learning in the field of cyber security with adaptability, autonomy, responsibility, and personal and professional accountability for actions as a practitioner and a learner. |
Teamwork | Work independently and collaboratively within multidisciplinary environments to achieve team goals, contributing advanced knowledge and skills from cyber security to advance the teams objectives, employing effective teamwork practices and principles to cultivate creative thinking, interpersonal adeptness, leadership skills, and handle challenging discussions, while excelling in diverse professional, social, and cultural scenarios. |
Global Citizenship | Engage in professional and ethical behaviour in the field of cyber security, with appreciation for the global context, and openly and respectfully collaborate with diverse communities and cultures. |
Course rules
To complete the Master of Cyber Security students must pass 16 credit points and meet the following course rules to be eligible to graduate:
- DAI001 Academic Integrity and Respect at Deakin (0-credit-point compulsory unit) in their first study period
- Part A: Foundation Information Technology studies
- 4 credit points of core units
- Part B: Fundamental Cyber Security studies
- 4 credit points of core units
- Part C: Mastery Cyber Security studies
- 4 credit points of core units
- Part D: Cyber Security capstone studies
- 3 credit points of core units
- 1 credit point course elective unit, level 7 SIT or MIS-coded.
Depending upon prior qualifications and/or experience, you may receive credit towards Parts A and B.
Students are required to meet the University's academic progress and conduct requirements. See the enrolment codes and terminology to help make sense of the University’s vocabulary.
Course structure
Part A: Foundation Information Technology Studies
DAI001 | Academic Integrity and Respect at Deakin (0 credit points) |
SIT771 | Object-Oriented Development |
SIT772 | Database Fundamentals |
SIT773 | Software Requirements Analysis and Modelling |
SIT774 | Web Technologies and Development |
Part B: Fundamental Cyber Security Studies
SIT736 | Identity, Access Management and Physical Security |
SIT719 | Analytics for Security and Privacy |
SIT763 | Cyber Security Management |
SIT716 | Computer Networks and Security |
Part C: Mastery Cyber Security Studies
SIT735 | Application and Communication Protocol Security |
SIT703 | Computer Forensics and Investigations |
SIT704 | Ethical Hacking |
SIT738 | Secure Coding |
Part D: Cyber Security Capstone Studies
SIT753 | Professional Practice in Information Technology |
SIT764 | Team Project (A) - Project Management and Practices |
SIT782 | Team Project (B) - Execution and Delivery |
Plus 1 level 7 SIT or MIS-coded open elective unit (1 credit point).
Work experience
You may have an opportunity to undertake a placement as part of your course. For more information, please visit deakin.edu.au/sebe/wil.
Course duration
Course duration may be affected by delays in completing course requirements, such as failing of units or accessing or completing placements.
Further information
Student Central can help you with course planning, choosing the right units and explaining course rules and requirements.
- Contact Student Central
Fees and charges
Fees and charges vary depending on the type of fee place you hold, your course, your commencement year, the units you choose to study, and their study discipline or your study load.
Tuition fees increase at the beginning of each calendar year and all fees quoted are in Australian dollars ($AUD). Tuition fees do not include textbooks, computer equipment or software, other equipment or costs such as mandatory checks, travel and stationery.
For further information regarding tuition fees, other fees and charges, invoice due dates, withdrawal dates, payment methods visit our Current students website.