Bachelor of Cyber Security

Macquarie University

About

Overview This new course aims at addressing the well-documented skills gap in cyber security.

It provides a comprehensive introduction to the latest technical aspects of cyber security, covering topics such as applied cryptography, offensive security, digital forensics, secure application development, artificial intelligence, data privacy and information security.

It features a capstone … For more content click the Read More button below.

The first distinctive feature of this program is that it deals with all the latest advances in the field.

In a fast moving field like cyber security, that is an important advantage.

Another distinctive feature is that it promotes a multidisciplinary approach to cyber security with a number of units co-taught with other Faculties.

Finally, it is designed with the strong input from Industry via the Cyber Security Hub.

It will deliver graduates with a wide range of capabilities and skills, namely with an operational focus (e.g.

SOC analyst), a policy focus (e.g.

InfoSec analyst) and a development focus (e.g.

DevSecOps).

All those roles are in high demand.

(COMP1300 Introduction to Cyber Security) or offered by other Faculties (PICT2001, ACCG3060 or BUSL315) This course will strengthen the links between Industry and the University as it will effectively become a pipeline of graduates for our Industry partners which will in return provide opportunities for scholarships, internships and work experience.

A number of students will be given the opportunity to complete an industry internship.

This internship will count toward the Degree via completion of one or two dedicated units in their flexible zone.This new course aims at addressing the well-documented skills gap in cyber security.

It provides a comprehensive introduction to the latest technical aspects of cyber security, covering topics such as applied cryptography, offensive security, digital forensics, secure application development, artificial intelligence, data privacy and information security.

It features a capstone unit addressing the practical management side of cyber security in a business setting.

The first distinctive feature of this program is that it deals with all the latest advances in the field.

In a fast moving field like cyber security, that is an important advantage.

Another distinctive feature is that it promotes a multidisciplinary approach to cyber security with a number of units co-taught with other Faculties.

Finally, it is designed with the strong input from Industry via the Cyber Security Hub.

It will deliver graduates with a wide range of capabilities and skills, namely with an operational focus (e.g.

SOC analyst), a policy focus (e.g.

InfoSec analyst) and a development focus (e.g.

DevSecOps).

All those roles are in high demand.

(COMP1300 Introduction to Cyber Security) or offered by other Faculties (PICT2001, ACCG3060 or BUSL315) This course will strengthen the links between Industry and the University as it will effectively become a pipeline of graduates for our Industry partners which will in return provide opportunities for scholarships, internships and work experience.

A number of students will be given the opportunity to complete an industry internship.

This internship will count toward the Degree via completion of one or two dedicated units in their flexible zone.Read More

Entry requirements

About inherent requirementskeyboard_arrow_down

Inherent requirements are the essential components of a course or program necessary for a student to successfully achieve the core learning outcomes of a course or program. Students must meet the inherent requirements to complete their Macquarie University course or program. For more information see https://students.mq.edu.au/study/my-study-program/inherent-requirements. Inherent requirements for Macquarie University programs fall under the following categories:

Physicalkeyboard_arrow_down

The physical inherent requirement is to have the physical capabilities to safely and effectively perform the activities necessary to undertake the learning activities and achieve the learning outcomes of an award.

Cognitionkeyboard_arrow_down

The inherent requirement for cognition is possessing the intellectual, conceptual, integrative and quantitative capabilities to undertake the learning activities and achieve the learning outcomes of an award.

Communicationkeyboard_arrow_down

The inherent requirement for communication is the capacity to communicate information, thoughts and ideas through a variety of mediums and with a range of audiences.

Behaviouralkeyboard_arrow_down

The behavioural inherent requirement is the capacity to sustain appropriate behaviour over the duration of units of study to engage in activities necessary to undertake the learning activities and achieve the learning outcomes of an award.

Learning outcomes

1. Demonstrate well-developed core Information Technology knowledge and skills, including in programming, web technologies, data storage and modelling, machine learning, cyber security and networking.
2. Exercise problem solving skills, creative thinking and judgement to address realistic cyber security challenges and increase cyber resilience.
3. Communicate effectively and work productively as a team member on industry-relevant projects.
4. Describe and explain cyber security issues in relation to organisational and societal contexts, particularly regarding ethics, cybercrime, human factors, policies and regulatory frameworks.
5. Use a range of communication strategies and techniques to effectively convey cyber security threats, risks, policies and strategies to technical and non-technical audiences.
6. Describe concepts and apply techniques and tools to increase data security, provide data assurance and protect privacy.
7. Develop software and web applications according to best security practices, ensuring their immunity to a range of known attacks.
8. Adhere to highest ethical standards and display professionalism, especially when assessing and exploiting the vulnerabilities of a system or an organisation.
9. Leverage insights into the motivations, mindsets, capabilities and skills of cybercriminals in order to evaluate the security of existing systems and procedures as well as designing and implementing safer ones.
10. Analyse and manage cyber security risks in practice based on key policies and procedures covering technology, people and processes.

Institution