Bachelor of Cyber Security

Course summary for local students

Year

2017 course information

Award granted Bachelor of Cyber Security
CampusOffered at Burwood (Melbourne), Waurn Ponds (Geelong)
Cloud CampusYes
Length3 years full-time or part-time equivalent
Next available intake

March (Trimester 1), July (Trimester 2)

CSP annual fee (indicative) - commencing 2017$8,875 for 1 yr full-time - Commonwealth Supported Place (HECS)
Full fee paying annual fee - commencing 2017Not applicable
Faculty contacts

Faculty of Science, Engineering and Built Environment

School of Information Technology
Tel 03 9244 6699
sebe@deakin.edu.au

www.deakin.edu.au/information-technology

LevelUndergraduate
Clearly-in ATAR
Burwood (Melbourne): N/A
Waurn Ponds (Geelong) - off campus: N/A
Waurn Ponds (Geelong): N/A
CRICOS course code091336M
VTAC Codes1400314201 - Waurn Ponds (Geelong), Commonwealth Supported Place (HECS)
1400514201 - Burwood (Melbourne), Commonwealth Supported Place (HECS)
1400614201 - Cloud (online), Commonwealth Supported Place (HECS)
Deakin course code S334

Course sub-headings

Course overview

Deakin’s Bachelor of Cyber Security provides a solid foundation of the cyber security literacy and technical skills required by industry for a cyber security professional including those allowing you to be able to investigate and combat cyber-crime and cyber terrorism.

The digital world is central to the way we live, work, communicate and conduct business. Now more than ever, it’s vital that the data and systems providing these services be safeguarded by ethical professionals with strong cyber security literacy and technical skills.

Whether it’s keeping in touch with friends on social networks, paying bills online, or using water or electricity, we depend on secure networked systems to keep our confidential information safe and rely on the assurance provided by custodians of this information to carry out activities in our day-to-day lives. Governments, military, financial institutions, hospitals and other businesses are all facing an unprecedented sophistication of cyber-attacks and there is a shortage of people with the skills and capability needed to ensure security in cyberspace.

This course will teach you how to identify, diagnose, analyse and manage the challenges of Cyber security. You’ll cover areas such as computer crime and digital forensics, evaluating software for security vulnerabilities, designing secure databases, securing operating systems, assessing and reinforcing the security of websites, integrating security requirements into new developments, designing secure network architectures, performing risk assessments and responding to cyber security incidents.

Classes use specialised software to enable practice of real world cyber-attack and response scenarios. You’ll consequently get the chance to reflect on the need for cyber security in a working environment, and the various solutions that might apply.

The degree focuses on technical elements and sets you up with strong skills in critical thinking and problem solving. You’ll be able to apply your learning in the workplace, and capably deal with imminent threats and challenges from the digital space where interconnected vehicles, drones, smart home gadgets, mobile and wearable devices, and health-kits prosper.

The course will help you develop strong interpersonal skills and a capacity for team-work. You’ll also build your written and oral communications skills, which means that you’ll graduate as a qualified and highly employable IT professional.

Career options include work as a security analyst, project manager, security system manager, cryptographer, business analyst, consultant, security system developer or programmer, information security auditor, law enforcement personnel or IT security engineer. An honours year is available for high-achieving students upon completion of this degree.

As a graduate of this degree you’ll be eligible for professional recognition with the Australian Computer Society (ACS) - Australia’s leading professional association for the Information and Communication Technology (ICT) sector. As a member, you’ll receive international recognition for your skills as well as professional development opportunities, networking and information resources.

Units in the course may include assessment hurdle requirements.

Professional recognition

The Bachelor of Cyber Security is professionally accredited with the Australian Computer Society (ACS).

Fees and charges

The tuition fees you pay will depend on the units you choose to study as each unit has its own costs. The ‘Estimated tuition fee’ is provided as a guide only based on a typical enrolment of students undertaking the first year of this course. The cost will vary depending on the units you choose, your study load, the time it takes to complete your course and any approved Credit for Prior Learning you have.

Each unit you enrol in has a credit point value. The ‘Estimated tuition fee’ is calculated by adding together 8 credit points of a typical combination of units for that course. Eight credit points is used as it represents a typical full-time enrolment load for a year.

You can find the credit point value of each unit under the Unit Description by searching for the unit in the Handbook.

Learn more about fees and available payment options.

Career opportunities

Career options include work as a security analyst, project manager, security system manager, cryptographer, business analyst, consultant, security system developer or programmer, information security auditor, law enforcement personnel or IT security engineer.

Course Learning Outcomes

Deakin Graduate Learning Outcomes (DGLOs)

Course Learning Outcomes (CLOs)

 

1. Discipline-specific knowledge and capabilities: appropriate to the level of study related to a discipline or profession.

  • Develop a broad, coherent knowledge of the IT discipline including its dynamic environment, with detailed knowledge of project management principles and in depth knowledge in IT Security.
  • Design, develop and implement IT systems and software, and associated policies and procedures for optimal use and apply industry standards and best practice in one or more specialised areas of IT.
  • Acquire in-depth knowledge and skills to develop, implement and manage security solutions for systems, networks, and data according to industry-accepted standards and best practice.

 

2. Communication: using oral, written and interpersonal communication to inform, motivate and effect change.

  • Communicate in an IT context to inform, motivate and effect change utilising a range of verbal, graphical and written methods, recognising the needs of diverse audiences.

 

3. Digital literacy: using technologies to find, use and disseminate information.

  • Utilise a range of digital technologies and information sources to discover, analyse, evaluate, select, process and disseminate both technical and non-technical information.

 

4. Critical thinking: evaluating information using critical and analytical thinking and judgment.

  • Evaluate specialist IT information using critical and analytical thinking, technical skills and well-developed judgement to identify problems, analyse user requirements and propose solutions.

 

5. Problem solving: creating solutions to authentic (real world and ill-defined) problems.

  • Apply theoretical constructs and skills and critical analysis to real-world and ill-defined problems and develop innovative IT solutions.

6. Self-management: working and learning independently, and taking responsibility for personal actions.

  • Apply knowledge and skills to new situations in professional practice and/or further learning in the field of IT with adaptability, autonomy, responsibility and personal accountability for actions as a practitioner and a learner.
  • Apply understanding of reflective practice and self critique skills within broad parameters to plan for their own future continuing professional development.

 

 

7. Teamwork: working and learning with others from different disciplines and backgrounds.

  • Apply the principles of effective teamwork as a member of diverse IT teams to demonstrate responsibility for own learning within broad parameters.

8. Global citizenship: engaging ethically and productively in the professional context and with diverse communities and cultures in a global context.

  • Apply professional and ethical standards and accountability for own learning to the development, design, construction and management of localised IT solutions.

 Approved by Faculty Board 14 July 2016

Course rules

To complete the Bachelor of Cyber Security, students must attain 24 credit points.  Most units (think of units as 'subjects') are equal to 1 credit point. So that means in order to gain 24 credit points, you’ll need to study 24 units (AKA ‘subjects’) over your entire degree. Most students choose to study 4 units per trimester, and usually undertake two trimesters each year.

The course comprises 24 credit points including 17 core units (these are compulsory) and 7 elective units (you can choose which ones to study).

Course structure

Core

Level 1 -Trimester 1

SIT101Fundamentals of Information Technology

SIT105Critical Thinking and Problem Solving for IT

SIT192Discrete Mathematics

SIT010Safety Induction Program (0 credit points)

Plus one elective unit

Level 1 - Trimester 2

SIT103Database and Information Retrieval

SIT104Introduction to Web Development

SIT182Real World Practices for Cyber Security

Plus one elective unit


Level 2 - Trimester 1

SIT223Information Technology Professional Skills

SIT282Computer Crime and Digital Forensics

STP010Introduction to Work Placements (0 credit points)

Plus two elective units

Level 2 - Trimester 2

SIT202Computer Networks

SIT281Cryptography

SIT284IT Security Management

Plus one elective unit


Level 3 - Trimester 1

SIT374Project Design

SIT384Data Analytics for Cyber Security

SIT379Ethical Hacking #

Plus one unit in:

SIT306IT Internship ^

or

STP301Industry Based Learning

Level 3 - Trimester 2

SIT302Project Delivery

SIT382System Security

Plus two elective units

^ offered in Trimester 1, trimester 2 and trimester 3

# available from 2018

Electives

Select from a range of elective units offered across many courses. In some cases you may even be able to choose elective units from a completely different discipline area (subject to meeting unit requirements).


Equipment requirements

For information regarding hardware and software requirements, please refer to the School of Information Technology's website, www.deakin.edu.au/information-technology/students or telephone 03 9244 6699.

Combined courses

The Bachelor of Cyber Security is also available as a combined course with Criminology, please refer to D380 Bachelor of Criminology/Bachelor of Cyber Security.

Entry requirements - general

Deakin University offers admission to undergraduate courses through a number of admission categories.

In all categories of admission, selection is based primarily on academic merit as indicated by an applicant's previous academic record.

For more information on the Admission Criteria and Selection Policy visit The Guide.

Credit for prior learning - general

The University aims to provide students with as much credit as possible for approved prior study or informal learning which exceeds the normal entrance requirements for the course and is within the constraints of the course regulations. Students are required to complete a minimum of one-third of the course at Deakin University, or four credit points, whichever is the greater. In the case of certificates, including graduate certificates, a minimum of two credit points within the course must be completed at Deakin.

You can also refer to the Credit for Prior Learning System which outlines the credit that may be granted towards a Deakin University degree and how to apply for credit.

How to apply

Trimester 3 – start studying in November 2016

To see if this course is taking applications, check our Trimester 3 webpage. Applications for Trimester 3 are made directly to Deakin through our Applicant Portal.

Trimester 1 – start studying in March 2017

Apply through VTAC for Trimester 1.

Exceptions to submitting a VTAC application

If you are:

  • not studying Year 12 in 2016 and only intend to apply to one institution for one course (which is Deakin), or
  • applying for a Deakin course, which is not listed on the VTAC website.

a direct application can be submitted to Deakin through our Applicant Portal.

Workload

You can expect to participate in a range of teaching activities each week. This could include classes, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.

Work experience

You will have an opportunity to undertake a discipline-specific Industry-Based Learning placement as part of your course. This will provide you with the opportunity to apply and consolidate what you are learning in your course, experience workplace culture and workplace practices, explore career options and develop a professional network before you graduate. Please refer to deakin.edu.au/sebe/wil.