Overview
The Cyber Security (Online) course from Adelaide University emphasises human-centric security, recognising the importance of user behaviour and organisational culture in preventing digital risks. You’ll learn how to design secure systems, rethink the approach to privacy, conduct risk assessments and implement effective security controls. An Introduction to System Security course will introduce you to the fundamentals of software, system, and hardware security – including cryptography, authentication and authorisation. Across the program, you’ll learn systems thinking, analysis and communication skills to bridge the gap between business and IT.
In our cyber security fundamentals course, you’ll examine both the attacker’s and defender’s viewpoint through real-world scenarios. Listen to common attack and defence strategies used against software, web applications, networks, operating systems, cryptographic systems. Discover how people’s behaviour impacts cyber defence. Explore areas such as security operations, risk management, security engineering and security architecture.
You’ll also investigate the political and economic implications of cyber attacks, examining case studies and policy frameworks for the wider context. Learn problem-solving methods to communicate and address cyber security threats confidently, and gain the skills to mitigate threats through assessments, policies and defence plans.
With an understanding of the qualitative and quantitative research methods and techniques used in the cyber community, you'll be ready to effectively evaluate published cyber security research and present your findings to industry peers and professionals.
Career opportunities:
Digital technology is the backbone of our modern society – from energy to finance, healthcare and education. Our technological dependence leaves us susceptible to cyber-attacks. With cybercrime on the rise, the need for skilled cyber security experts to protect our data is more critical than ever.
You might be a penetration tester, conducting ethical hacking to identify vulnerabilities in systems – then providing recommendations for improvements. You could play a pivotal role in Australia’s cyber defence strategy by developing policies and guidelines. Perhaps you’ll join the frontline of cyber security, identifying and mitigating threats to Australia’s financial institutions.
Other potential roles in the field include:
- Threat intelligence analyst
- IT security specialist
- Network security administrator
- Security architect
- Incident response manager
- Government cyber security consultant.
Programme Structure
Courses include:
Business Data & Cyber Security (M)
Information Risks, Threats & Controls (M)
Cybersecurity Fundamentals
Political Institutions and Policy-Making
Key information
Duration
- Part-time
- 6 months
Start dates & application deadlines
- Starting
- Apply before , International
-
- Starting
- Apply before , International
-
- Starting
- Apply before , International
-
- Starting
- Apply before , International
-
- Starting
- Apply before , International
-
- Starting
- Apply before , International
-
Language
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Credits
Delivered
Campus Location
- Gawler, Australia
Disciplines
Cyber Security View 33 other Masters in Cyber Security in AustraliaWhat students do after studying
Academic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Other requirements
General requirements
CRICOS code: 04249J
To be eligible, an applicant must have achieved at least one of the following minimum entry requirements and demonstrate they fulfil any prerequisite and essential criteria for admission. In cases where there are more eligible applicants than available places, admission will be competitive with ranks based on the entry criteria.
Vocational Education and Training (VET)
- Completion of an award in networking and information technology from a registered training organisation (RTO) at diploma (AQF level 6) or higher AND 2 years of relevant work experience.
Higher education study
- A completed Bachelor of Computer Science (AQF level 7) or equivalent from a recognised higher education institution.
Work experience
- At least 3 years of work experience in computer science or cyber security.
Tuition Fees
-
International Applies to you
Applies to youNon-residents13992 AUD / year≈ 13992 AUD / year -
Domestic Applies to you
Applies to youCitizens or residents13992 AUD / year≈ 13992 AUD / year
Funding
In order for us to give you accurate scholarship information, we ask that you please confirm a few details and create an account with us.
Scholarships Information
Below you will find Master's scholarship opportunities for Cyber Security (Online).
Available Scholarships
You are eligible to apply for these scholarships but a selection process will still be applied by the provider.
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility