Masters of Information Technology - Cyber Security (VIC, NSW, QLD & WA Only)
Subjects
This subject introduces students to the foundational concepts of computer programming. It covers key principles such as variables, data types, control structures, functions, and basic object-oriented programming. Designed for beginners, this subject provides hands-on experience in writing and debugging code, helping students develop problem-solving skills and a solid understanding of how software operates.
This subject provides an introduction to the basic concepts and principles of computer networking. Students will learn about network types, architectures, protocols, and devices such as routers, switches, and firewalls. The subject covers essential topics like the OSI and TCP/IP models, IP addressing, and network security fundamentals, equipping students with the foundational knowledge required to understand, design, and troubleshoot simple network systems.
This subject introduces students to the principles and practices of project management with a focus on Agile methodologies. The subject covers key concepts such as project planning, scope management, time and cost estimation, risk management, and stakeholder communication. Emphasizing Agile frameworks like Scrum and Kanban, students will learn how to manage projects in dynamic environments, adapt to change, and deliver value through iterative development and team collaboration.
Database System Analysis and Design focuses on the principles and techniques used in designing effective and efficient database systems. Students will learn about data modeling, normalization, relational database concepts, and SQL. The subject also covers the database development lifecycle, from requirements analysis to implementation, emphasizing the importance of data integrity, security, and performance. Through practical exercises, students gain hands-on experience in designing and managing databases to support real-world applications.
Cyber Security Fundamentals & Ethics introduces students to the essential concepts of cyber security alongside the ethical and legal considerations in the digital world. Topics include threat types, vulnerabilities, security controls, encryption, and risk management. The subject also explores professional ethics, privacy issues, and cyber laws, helping students understand the responsibilities and ethical challenges faced by cyber security professionals. It lays a strong foundation for further study and careers in the field of cyber security.
Network Security provides students with a comprehensive understanding of how to protect and secure computer networks against cyber threats. The subject covers key topics such as firewalls, intrusion detection and prevention systems, VPNs, encryption, authentication protocols, and network security policies. Students will also explore common attack methods and learn how to design and implement security measures to safeguard network infrastructure. Practical exercises reinforce theoretical knowledge, preparing students for real-world network security challenges.
Information Security Management explores the strategic and operational aspects of managing information security within an organization. Students will learn about security governance, risk assessment, compliance standards (such as ISO/IEC 27001), incident response, and business continuity planning. The subject emphasizes aligning security practices with business objectives, developing security policies, and managing human factors in security. As an elective IT subject, it equips students with the skills to lead and manage enterprise-level security programs effectively.
Ethical Hacking and Penetration Testing introduces students to the tools, techniques, and methodologies used by ethical hackers to identify and address security vulnerabilities. The subject covers penetration testing frameworks, reconnaissance, vulnerability assessment, exploitation, and post-exploitation techniques. Emphasis is placed on legal and ethical considerations, responsible disclosure, and the use of industry-standard tools in a controlled environment. Students gain hands-on experience in simulating real-world cyberattacks to strengthen system defenses.
Cyber Physical Systems and IoT Security focuses on the security challenges and solutions related to Cyber-Physical Systems (CPS) and the Internet of Things (IoT). Students will explore the architecture, communication protocols, and vulnerabilities of connected devices and embedded systems. The subject covers threat modeling, secure system design, and risk mitigation strategies for IoT environments. Emphasis is placed on real-world applications such as smart homes, industrial control systems, and critical infrastructure, preparing students to secure emerging technologies in an increasingly connected world.
Information Security and Cryptography Techniques provides an in-depth understanding of information security principles and the role of cryptography in protecting data. Students will learn about classical and modern encryption methods, cryptographic algorithms, digital signatures, key management, and secure communication protocols. The subject also covers the application of cryptographic techniques in ensuring confidentiality, integrity, authentication, and non-repudiation. Through theoretical and practical learning, students gain the skills to apply cryptographic solutions to real-world security challenges.
Threat Intelligence focuses on the processes and tools used to collect, analyze, and apply information about current and emerging cyber threats. Students will learn how to identify threat actors, understand their tactics, techniques, and procedures (TTPs), and transform raw data into actionable intelligence. The subject covers strategic, operational, and tactical threat intelligence, as well as threat modeling frameworks such as MITRE ATT&CK. By the end of the course, students will be equipped to support proactive defense strategies and enhance an organization’s cyber resilience.
Cloud Security explores the principles, practices, and technologies involved in securing cloud computing environments. Students will learn about cloud service models (IaaS, PaaS, SaaS), shared responsibility models, identity and access management, data protection, and compliance requirements in the cloud. The subject also covers common cloud vulnerabilities, threat mitigation strategies, and secure cloud architecture design. Emphasis is placed on real-world applications and industry standards, preparing students to effectively manage and secure cloud-based systems.
Capstone Project is a culminating subject that allows students to apply the knowledge and skills gained throughout their course to a real-world or research-based project. Working individually or in teams, students will plan, design, implement, and present a comprehensive solution to a complex problem in their area of study. The subject emphasizes project management, critical thinking, problem-solving, and effective communication, providing a valuable opportunity to showcase professional and technical competencies in a practical context.
Elective IT Elective allows students to choose a subject from a range of Information Technology-related options based on their interests or career goals. These electives may cover areas such as software development, data analytics, artificial intelligence, cloud computing, cyber security, or emerging technologies. The flexibility of elective subjects enables students to broaden their knowledge, deepen expertise in a specific field, or complement their core studies with industry-relevant skills.
Choice of Electives:
CYB706 Digital forensics
CYB708 Cyber ethics
CYB709 AI and Big Data Security
ICT708 Management Information Systems
CYB710 Operating System Security
MGT602 – Managing Diverse Talent
Want more information about the subjects for this course?
Want to know more about this course?
Complete the form and learn about:
- Pricing and payment options
- Start dates
- Subjects
- Study method
- How to get help and contact information
- Everything you need to know before enrolling!
Want to know more about this course?
Get your free course guide now! Complete this easy form and you'll receive a course guide and consultation from The Australian Institute of Business Intelligence Pty Ltd