The Master of Cyber Security (Professional) is designed to extend the specialised cyber security skills obtained in the Master of Cyber Security by providing students with the opportunity to undertake a period of industry-based learning or a research project under the supervision of our internationally-recognised research staff.
The course is designed to prepare you for a variety of security roles within business, government and law enforcement by combining technical studies in system security, digital forensics and analytics with organisational security, governance and policy. A serious challenge facing our 21st century digital life is how to deal with the dramatic increase in the number and severity cyber attacks which cause great loss and sufferings to society, governments, companies and individual’s prosperity and reputations. The issue of dealing with cyber attacks is integral to a wide variety of organisations, across all levels of society in the context of technology, law and ethics. Having professionals with cyber security skills is crucial for the ongoing success of our digital future.
The course is ideally suited to those who have completed an undergraduate degree in a similar discipline, in the field of information technology or computing.
Units in the course may include assessment hurdle requirements.Read More
To complete the Master of Cyber Security (Professional), students must attain 16 credit points over 2 years of full time study (or part time equivalent). Most students choose to study 4 units per trimester, and usually undertake two trimesters each year.
The course comprises a total of 16 credit points which must include ten (10) core units, two level 7 SIT course grouped elective units plus a further 4 credit points from a specified list.
Plus a further four credit points from the below list:
* must have successfully completed STP710 Introduction to Work Placements (0 credit point unit)
Two additional level 7 SIT course grouped elective units.
Campuses by intake
Campus availability varies per trimester. This means that a course offered in Trimester 1 may not be offered in the same location for Trimester 2 or 3. Read more to learn where this course will be offered throughout the year.
Trimester 1 - March
- Start date: March
- Available at:
- Cloud Campus
Trimester 2 - July
- Start date: July
- Available at:
- Cloud Campus
INTERNATIONAL STUDENTS – Please note that due to Australian Government regulations, student visas to enter Australia cannot be issued to students who enrol in Deakin’s Cloud Campus.
Additional course information
Course duration - additional information
Course duration may be affected by delays in completing course requirements, such as accessing or completing work placements.
You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.
You will have an opportunity to undertake a discipline-specific internship placement as part of your course. deakin.edu.au/sebe/wil.
Deakin University offers admission to postgraduate courses through a number of Admission categories. In all categories of admission, selection is based primarily on academic merit as indicated by an applicant's previous academic record.
All applicants must meet the minimum English language requirements.
- Bachelor degree in related discipline, OR
- Graduate Certificate of Information Technology or equivalent.
For more information on the Admission Criteria and Selection (Higher Education Courses) Policy visit the Deakin Policy Library.
Fees and scholarships
Learn more about fees and your options for paying.
The available fee places for this course are detailed above.
Tuition fees are determined by your enrolment:
- If you are offered a full fee paying place, your tuition fees are calculated based on your course.
- If you are offered a Commonwealth supported place, your tuition fees are calculated depending on the units you choose. Not all courses at Deakin have Commonwealth supported places available.
The 'Estimated tuition fee' is provided as a guide only based on a typical enrolment of students completing the first year of this course. The cost will vary depending on the units you choose, your study load, the length of your course and any approved Credit for Prior Learning.
* One year full-time study load is typically represented by eight credit points of study. Each unit you enrol in has a credit point value. The 'Estimated tuition fee' is calculated by adding together 8 credit points of a typical combination of units for your course.
You can find the credit point value of each unit under the Unit Description by searching for the unit in the Handbook.
Learn more about fees and available payment options.
A Deakin scholarship could help you pay for your course fees, living costs and study materials. If you've got something special to offer Deakin - or maybe you just need a bit of extra support - we've got a scholarship opportunity for you. Search or browse through our scholarships
Career options are varied, you could work anywhere in the world as a:
- security analyst
- project manager
- security system manager
- security system developer or programmer information security auditor
- business continuity or IT security engineer.
Course learning outcomes
Deakin's graduate learning outcomes describe the knowledge and capabilities graduates can demonstrate at the completion of their course. These outcomes mean that regardless of the Deakin course you undertake, you can rest assured your degree will teach you the skills and professional attributes that employers value. They'll set you up to learn and work effectively in the future.
Deakin Graduate Learning Outcomes
Course Learning Outcomes
Discipline-specific knowledge and capabilities
Develop, evaluate, implement and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice. Design, develop and implement advanced cyber systems and software, and associated policies and procedures for optimal use to withstand emerging attacks/threats in cyber space.Assess the role of cyber security in the context of modern organisations and society in order to add value.
Communicate effectively in order to design, evaluate and respond to advances in technology, future trends and industry standards and utilise a range of verbal, graphical and written forms, customised for diverse audiences including specialist and non- specialist clients, colleagues and industry personnel.
Utilise a range of digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique and disseminate both technical and professional information.
Appraise complex information using critical and analytical thinking and judgement to identify problems, analyse user requirements and propose appropriate and innovative solutions. Evaluate the place and role of security systems, applications and processes in organisational and societal contexts for reliability, usefulness and the value they add to those contexts.
Generate IT security solutions through the application of specialised theoretical constructs, expert skills and critical analysis to real-world, ill-defined problems to develop appropriate and innovative IT solutions.
Take personal, professional and social responsibility within changing national and international professional IT contexts to develop autonomy as researchers and evaluate own performance for continuing professional development. Work autonomously and responsibly to create solutions to new situations and actively apply knowledge of theoretical constructs and methodologies to make informed decisions.
Work independently and collaboratively towards achieving the outcomes of a group project, thereby demonstrating interpersonal skills including the ability to brainstorm, negotiate, resolve conflicts, manage difficult and awkward conversations, provide constructive feedback, and demonstrate the ability to function effectively in diverse professional, social and cultural contexts.
Engage in professional and ethical behaviour in the design, development and management of IT systems, in the global context, in collaboration with diverse communities and cultures.
Approved by Faculty Board 27 July 2017
How to apply
Apply direct to Deakin
Applications can be made directly to the University through the Applicant Portal if you are only applying for one course. For information on the application process and closing dates, see the how to apply web page. Please note that closing dates may vary for individual courses.Apply through Deakin
Need more information on how to apply?
For more information on the application process and closing dates, see the How to apply webpage. If you're still having problems, please contact us for assistance.
Register your interest to study at Deakin
Please complete the Register your interest form to receive further information about our direct application opportunities.
Credit for prior learning
The University aims to provide students with as much credit as possible for approved prior study or informal learning which exceeds the normal entrance requirements for the course and is within the constraints of the course regulations. Students are required to complete a minimum of one-third of the course at Deakin University, or four credit points, whichever is the greater. In the case of certificates, including graduate certificates, a minimum of two credit points within the course must be completed at Deakin.
You can also refer to the Credit for Prior Learning System which outlines the credit that may be granted towards a Deakin University degree and how to apply for credit.
Credit for prior learning may be granted to applicants based on prior studies and/or equivalent industry experience.