Bachelor of Cyber Security and Master of Information Technology in Cyber Security

Macquarie University

About

Overview This course combines our important courses in Cyber Security at the undergraduate and postgraduate level into a coherent four year course.

The undergraduate part provides a comprehensive introduction to the latest technical aspects of cyber security, covering topics such as applied cryptography, offensive security, digital forensics, secure application development, artificial … For more content click the Read More button below.

The postgraduate part of the course has been designed as an advanced course in the technology aspects of Cyber Security for students with a Bachelor Degree in IT.

The advanced level units are drawn from Computing with five units covering theory and practice in data privacy and information security, artificial intelligence, security operations, identity management, etc.

This combination of skills and knowledge is in high-demand from industry.

The course is completed with a 20cp capstone project that can be either an industry placement (internship) or an internal research project.

This allows students to gain experience working on real Cyber Security projects and, for appropriate students, direct exposure to industry problems and practices.This course combines our important courses in Cyber Security at the undergraduate and postgraduate level into a coherent four year course.

The undergraduate part provides a comprehensive introduction to the latest technical aspects of cyber security, covering topics such as applied cryptography, offensive security, digital forensics, secure application development, artificial intelligence, data privacy and information security.

It features an undergraduate capstone unit addressing the practical management side of cyber security in a business setting.

The postgraduate part of the course has been designed as an advanced course in the technology aspects of Cyber Security for students with a Bachelor Degree in IT.

The advanced level units are drawn from Computing with five units covering theory and practice in data privacy and information security, artificial intelligence, security operations, identity management, etc.

This combination of skills and knowledge is in high-demand from industry.

The course is completed with a 20cp capstone project that can be either an industry placement (internship) or an internal research project.

This allows students to gain experience working on real Cyber Security projects and, for appropriate students, direct exposure to industry problems and practices.Read More

Entry requirements

About inherent requirementskeyboard_arrow_down

Inherent requirements are the essential components of a course or program necessary for a student to successfully achieve the core learning outcomes of a course or program. Students must meet the inherent requirements to complete their Macquarie University course or program. For more information see https://students.mq.edu.au/study/my-study-program/inherent-requirements. Inherent requirements for Macquarie University programs fall under the following categories:

Physicalkeyboard_arrow_down

The physical inherent requirement is to have the physical capabilities to safely and effectively perform the activities necessary to undertake the learning activities and achieve the learning outcomes of an award.

Cognitionkeyboard_arrow_down

The inherent requirement for cognition is possessing the intellectual, conceptual, integrative and quantitative capabilities to undertake the learning activities and achieve the learning outcomes of an award.

Communicationkeyboard_arrow_down

The inherent requirement for communication is the capacity to communicate information, thoughts and ideas through a variety of mediums and with a range of audiences.

Behaviouralkeyboard_arrow_down

The behavioural inherent requirement is the capacity to sustain appropriate behaviour over the duration of units of study to engage in activities necessary to undertake the learning activities and achieve the learning outcomes of an award.

Learning outcomes

1. Demonstrate specialised knowledge of the principles and concepts of Information Technology and information security.
2. Creatively solve complex problems in cyber security and increase cyber resilience.
3. Collaborate and communicate with others in a professional setting in a variety of modes, including verbally and in writing.
4. Describe and explain cyber security issues in relation to organisational and societal contexts, particularly regarding ethics, cybercrime, human factors, policies and regulatory frameworks.
5. Adhere to highest ethical standards and display professionalism, especially when assessing and exploiting the vulnerabilities of a system or an organisation.
6. Apply advanced techniques and tools to increase data security, protect privacy and provide digital access to information.
7. Develop software and web applications according to best security practices, ensuring their immunity to a range of known attacks.
8. Apply critical thinking and use appropriate tools to detect threats in devices, technology, processes and operations.
9. Leverage insights into the motivations, mindsets, capabilities and skills of cybercriminals in order to evaluate the security of existing systems and procedures as well as designing and implementing safer ones.
10. Manage day-to-day security operations using tools and procedures covering technology, people and processes.
11. Use a range of communication strategies and techniques to effectively convey cyber security threats, risks, policies and strategies to a senior, technical and non-technical audiences.
12. Independently design and implement research the area of cyber security.

Institution