B-SCCY v.1 Bachelor of Science (Cyber Security)
Curtin University
About
Bachelor Degrees prepare students to develop broad and coherent knowledge and skills in a discipline for professional work and further learning corresponding to AQF level 7 qualifications.
This course provides coverage of aspects of modern computing. It covers fundamental programming and theoretical knowledge followed by an opportunity to specialise in Cyber Security The courses offers coverage of the key concepts and challenges in data and resource protection and computer software security. There are a focus on both the high level (e.g. cryptography theory and data access policy development and security program management) and low level practical (e.g. computer forensics, network intrusion detection and incident handling) aspects of computer security. The addition of programming techniques differentiates this course from more policy-based options. The aim of this course is to prepare the students for the areas of ICT stated to be most in-demand and for positions that are most difficult to fill.
Course Accreditation Status
This course will be sent to the ACS for provisional accreditation once it is approved.
Career Opportunities
Graduates may be employed in one of a number of roles relating to computer or network security on either the red (penetration testing) or blue (target defense) teams. In addition they can join programming teams as security specialists and have good knowledge of security policy.
Additional Course Expenses
Students may be expected to purchase a number of textbooks and other essential study materials.
Structure
Bachelor Degrees typically contain a series of units which may include compulsory (core), optional or elective units to cater for student preferences. They may contain a range of majors, streams and/or minors/specialisations for students to choose from to pursue learning in a specialised area of study. Students can take no more than 250 credit points of first year level units.
Course Learning Outcomes
A graduate of this course can:
1. implement secure processes based on best practice when developing software and dealing with computer systems
2. evaluate standard algorithms, techniques, and software technologies in a manner that is appropriate for a given problem and think critically and creatively to generate innovative and optimum theoretical and practical solutions
3. identify, evaluate and synthesise information from a range of computing sources to optimise the process of software design and implementation
4. document software development activities and artefacts and communicate them in written and oral form to both technical and non-technical audiences and communicate effectively in ways appropriate to the audience and purpose
5. effectively use new and existing technologies, recognising their advantages and limitations
6. sustain intellectual curiosity by updating their knowledge, engage in continuous training and research, and take control of their own learning and development
7. recognise and apply IEEE/ACM/ACS standards and best practice in process software design and development
8. contribute to society using technology in an ethical, legal, and socially responsible manner
9. demonstrate initiative, leadership and ethical practice when working independently and collaboratively
Duration and Availability
This course is three years full-time or equivalent part-time study.
Location and delivery Mode
YEAR | LOCATION | PERIOD | ALL | INTERNAL | PARTIALLY ONLINE INTERNAL | EXTERNAL | FULLY ONLINE |
---|---|---|---|---|---|---|---|
2021 | Dubai Intern'l Academic City | Trimester 1 | Y | ||||
2021 | Dubai Intern'l Academic City | Trimester 2 | Y | ||||
2021 | Dubai Intern'l Academic City | Semester 2A | Y | ||||
2022 | Dubai Intern'l Academic City | Trimester 1 | Y | ||||
2022 | Dubai Intern'l Academic City | Trimester 2 | Y | ||||
2022 | Dubai Intern'l Academic City | Semester 2A | Y |
The information displayed above refers to study periods and locations where the course is available for first time entry. Students are normally only offered or admitted to a course once.
* The course itself may not be available either solely internally or externally but individual units may be offered in either or both of those modes. Prospective students should contact the Course Coordinator for further information.
^ Course and associated units are offered in this mode permitting International Onshore student enrolment.
# Course and associated units are offered in this online only mode and DO NOT permit International Onshore student enrolment.
YEAR 1 SEMESTER 1
Code | Version | Course Name | HRS/WK | Credit |
---|---|---|---|---|
ISEC2001 | v.2 | Fundamental Concepts of Data Security | 3.0 | 25.0 |
NPSC1003 | v.2 | Integrating Indigenous Science and STEM | 3.0 | 25.0 |
ISAD1000 | v.1 | Introduction to Software Engineering | 4.0 | 25.0 |
COMP1001 | v.1 | Object Oriented Program Design | 4.0 | 25.0 |
100.0 |
YEAR 1 SEMESTER 2
Code | Version | Course Name | HRS/WK | Credit |
---|---|---|---|---|
ISEC1000 | v.1 | Cyber Security Concepts | 3.0 | 25.0 |
COMP1002 | v.1 | Data Structures and Algorithms | 4.0 | 25.0 |
MATH1019 | v.2 | Linear Algebra and Statistics for Engineers | 5.0 | 25.0 |
COMP1000 | v.1 | Unix and C Programming | 4.0 | 25.0 |
100.0 |
YEAR 2 SEMESTER 1
Code | Version | Course Name | HRS/WK | Credit |
---|---|---|---|---|
CMPE2000 | v.1 | Data Communications and Network Management | 5.0 | 25.0 |
CNCO3001 | v.1 | Network Systems Design | 3.0 | 25.0 |
COMP2006 | v.1 | Operating Systems | 3.0 | 25.0 |
COMP2002 | v.1 | Unix Systems Programming | 4.0 | 25.0 |
100.0 |
YEAR 2 SEMESTER 2
Code | Version | Course Name | HRS/WK | Credit |
---|---|---|---|---|
COMP2005 | v.1 | Computing Topics | 3.0 | 25.0 |
ISEC3004 | v.1 | Cyber Crime and Security Enhanced Programming | 3.0 | 25.0 |
ISYS1001 | v.1 | Database Systems | 4.0 | 25.0 |
SELECT ELECTIVES TO THE TOTAL VALUE OF: | 25.0 | |||
100.0 |
YEAR 3 SEMESTER 1
Code | Version | Course Name | HRS/WK | Credit |
---|---|---|---|---|
ISEC2000 | v.1 | Fundamental Concepts of Cryptography | 3.0 | 25.0 |
COMP3010 | v.1 | Machine Learning | 3.0 | 25.0 |
ISEC3006 | v.1 | Cyber Security Capstone Project 1 | 1.0 | 25.0 |
OR | ||||
ISAD3000 | v.2 | Capstone Computing Project 1 | 1.0 | 25.0 |
SELECT ELECTIVES TO THE TOTAL VALUE OF: | 25.0 | |||
100.0 |
YEAR 3 SEMESTER 2
Code | Version | Course Name | HRS/WK | Credit |
---|---|---|---|---|
ISEC3005 | v.1 | Cyber Security- Intrusion Detection System and Incident Handling | 3.0 | 25.0 |
ISEC3002 | v.2 | Penetration Testing and Defence | 4.0 | 25.0 |
ISAD3001 | v.2 | Capstone Computing Project 2 | 1.0 | 25.0 |
OR | ||||
ISEC3007 | v.1 | Cyber Security Capstone Project 2 | 1.0 | 25.0 |
SELECT ELECTIVES TO THE TOTAL VALUE OF: | 25.0 | |||
100.0 |
Entry requirements
Applicants for a Bachelor Degree are required to meet University academic and English language entry standards; details are provided at http://study.curtin.edu.au/ and include flexible entry pathways. Any specific course entry and completion requirements must also be met.
Credit for Recognised Learning
Applications for credit towards a course are assessed on an individual basis. Credit reduces the amount of learning required to complete the course and may be granted for formal education qualifications, non-formal learning from non-award programs of study and informal learning through work experiences. Further information can be found at http://futurestudents.curtin.edu.au/non-school-leavers/rpl.cfm
Pathway to Further Study
Graduates may qualify for entry to a Bachelor Degree with Honours and some Graduate Certificates, Graduate Diplomas and Master degrees. For further details, see the University website http://curtin.edu.au.
Institution
