Master of Cyber Security (Professional) - GIFT City campus

Postgraduate coursework

Become a cyber security specialist with advanced knowledge of the detection, mitigation and management of cyber threats in our increasingly digital world.

Key facts


2 years full-time – 16 credit points (fast tracked to 18 months continuous study)


GIFT City, India

This course is delivered at our GIFT City campus, India. It is only available to applicants who hold Indian citizenship for study at GIFT City. This course is not available to international students studying onshore at campuses in Australia or as Online students.

Current Deakin Students

To access your official course details for the year you started your degree, please visit the handbook

Course overview

In an increasingly digital world, a serious challenge facing organisations is how to deal with the dramatic increase and severity of cyber attacks. Professionals with cyber security skills are crucial for the ongoing success of our digital future and are in high demand globally.

The Master of Cyber Security (Professional) prepares you to meet this demand, equipping you with the skills to tackle cyber security challenges from both a technical and organisational perspective. The course equips you with in-demand cyber security skills and provides opportunities for you to undertake in-depth professional studies as part of your course. Choose one of three professional studies options: a team project, a professional placement, or a research project under the supervision of our internationally recognised research staff.

Want to combat cyber crime and cyber terrorism?

Addressing cyber attacks is integral to a wide variety of organisations and government departments, in the context of technology, law and ethics. With access to state-of-the-art software and hardware throughout the course, you will undertake studies from both a technical and organisational perspective. Explore system security, digital forensics and analytics through to organisational security, governance and policy skills. Vital hands-on experience ensures that you will gain the skills required to confidently investigate and combat cyber-crime and cyberterrorism.

You’ll graduate ready for a variety of security roles within business, government and law enforcement. Examples include risk analyst, information security specialist, security system developer or programmer, cyber security consultant, security systems manager, security consultant, information security auditor or security manager. Combined with experience, you could take on roles such as chief security officer.

This course is ideally suited to those who have completed an undergraduate degree in a similar discipline, such as information technology or computing.

Read More

Course information

Award granted
Master of Cyber Security (Professional)

2024 course information

Deakin code
Australian Qualifications Framework (AQF) recognition

The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9

Course structure

To complete the Master of Cyber Security (Professional), students must attain 16 credit points over 1.5 years of full-time (continuous study).

The course is structured in three parts:

  • Part A: Mastery Cyber Security studies (8 credit points)
  • Part B: Course electives (4 credit points)
  • Part C: Professional studies (4 credit points)

The course comprises a total of 16 credit points, which must include the following:

  • completion of DAI001 Academic Integrity Module (0-credit point compulsory unit)
  • eight (8) credit points of core units
  • four (4) level 7 SIT or MIS-coded elective units (4 credit points) (excluding SIT771, SIT772, SIT773 and SIT774)
  • four (4) credit points of Professional Studies.

Students are required to meet the University's academic progress and conduct requirements.

Part A: Mastery Cyber Security Studies (Core units)

Mandatory unit for all entry levels

  • Academic Integrity Module (0 credit points)
  • Mastery Cyber Security Studies

  • Identity, Access Management and Physical Security
  • Analytics for Security and Privacy
  • Application and Communication Protocol Security
  • Computer Forensics and Investigations
  • Ethical Hacking
  • Cyber Security Management
  • Computer Networks and Security
  • Secure Coding
  • Part B: Course Electives

    Course electives

    Four (4) level 7 SIT or MIS-coded elective units >

    > Refer to Course Electives list.

    Course Electives (available at GIFT City)

  • Real World Analytics
  • IT Placements and Industry Experience *
  • Machine Learning in Business
  • Cyber Security Strategies
  • Foundation Skills in Data Analysis
  • Predictive Analytics
  • Decision Modelling for Business Analytics
  • Descriptive Analytics and Visualisation
  • Advanced Artificial Intelligence for Business
  • Business Intelligence and Database
  • Value of Information
  • Part C: Professional Studies

    Professional Studies

  • Professional Practice in Information Technology
  • Team Project (A) - Project Management and Practices ~
  • Team Project (B) - Execution and Delivery
  • One (1) level 7 SIT or MIS-coded elective (1 credit point) >


  • Career Tools for Employability (0 credit points)
  • Professional Practice in Information Technology
  • Professional Practice (2 credit points)*
  • One (1) level 7 SIT or MIS-coded elective (1 credit point) >


  • Research Techniques and Applications (2 credit points)
  • Research Project (Advanced) (2 credit points)^
  • OR

  • Professional Practice in Information Technology
  • Research Techniques and Applications (2 credit points)
  • One (1) level 7 SIT or MIS-coded elective (1 credit point) >

    *Students undertaking this unit must have successfully completed STP710 Career Tools for Employability (0-credit point unit)

    ~ Note: Students are expected to undertake SIT764 and SIT782 in consecutive trimesters. Students should seek advice from the unit chair if they are unable to complete SIT764 and SIT782 consecutively.

    ^ Entry to SIT723, SIT746 and SIT791 are subject to specific unit entry requirements.

    > Refer to Course Electives list.

    Intakes by location

    Trimester 2 - July

    • Start date: July
    • Available at:
      • GIFT City, India

    New course from Trimester 2, 2024.

    This course is delivered at our GIFT City campus, India. It is only available to applicants who hold Indian citizenship for study at GIFT City. This course is not available to international students studying onshore at campuses in Australia or as Online students.


    You can expect to participate in a range of teaching activities each week. This could include lectures, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.

    Entry requirements

    Selection is based on a holistic consideration of your academic merit, work experience, likelihood of success, availability of places, participation requirements, regulatory requirements, and individual circumstances. You will need to meet the minimum academic and English language proficiency requirements to be considered for selection, but this does not guarantee admission.

    Academic requirements

    To be considered for admission to this degree you will need to meet at least one of the following criteria:

    • completion of a bachelor degree or higher in a related discipline
    • completion of a bachelor degree or higher in any discipline and at least two years' relevant work experience (or part-time equivalent)
    • completion of a Graduate Certificate of Information Technology or equivalent

    English language proficiency requirements

    To meet the English language proficiency requirements of this course, you will need to demonstrate at least one of the following:

    • bachelor degree from a recognised English-speaking country
    • IELTS overall score of 6.5 (with no band score less than 6.0) or equivalent
    • other evidence of English language proficiency (learn more about other ways to satisfy the requirements)

    Applicants may be invited to attend an interview as part of the selection process

    Admissions information

    Learn more about Deakin courses and how we compare to other universities when it comes to the quality of our teaching and learning.

    Not sure if you can get into Deakin postgraduate study? Postgraduate study doesn’t have to be a balancing act; we provide flexible course entry and exit options based on your desired career outcomes and the time you are able to commit to your study.

    Fees and scholarships

    Fee information

    Fee rate

    Total course fee of $38,000, based on a study load of 16 credit points of study, or $9500 per trimester.

    All course fees are shown in Australian dollars (AUD) and are calculated on the basis of actual credit points of study undertaken. Course fees are exclusive of accommodation fees and charges, should such be required.

    Fees and charges vary depending on your course, your fee category and the year you started. To find out about the fees and charges that apply to you, visit

    Apply now

    Apply through Deakin

    Applications can be made directly to the University through StudyLink Connect - Deakin University's International Student Application Service. For information on the application process and closing dates, see the How to apply web page.

    Entry pathways

    Alternative exits


    Career outcomes

    The rapid growth of cybercrime has created unparalleled opportunities for those with cyber security expertise, with jobs in the Database & Systems Administrators & ICT Security sector predicted to increase by 38.9% by November 2026*.

    Career options are varied, you could work anywhere in the world as a:

    • security analyst
    • project manager
    • security system manager
    • security consultant
    • security system developer or programmer information security auditor
    • business continuity or IT security engineer.

    *Jobs and Skills Australia, 2021 Employment projections for the five years to 2026.

    Course learning outcomes

    Deakin's graduate learning outcomes describe the knowledge and capabilities graduates can demonstrate at the completion of their course. These outcomes mean that regardless of the Deakin course you undertake, you can rest assured your degree will teach you the skills and professional attributes that employers value. They'll set you up to learn and work effectively in the future.

    Deakin Graduate Learning Outcomes

    Course Learning Outcomes

    Discipline-specific knowledge and capabilities

    Develop, evaluate, implement, and manage cyber security solutions for complex systems, organisations, platforms communication channels, and data, based on industry-accepted standards and best practice.

    Design, develop and implement advanced cyber systems and software, and associated policies and procedures for optimal use to withstand emerging attacks/threats in cyber space.

    Assess the role of cyber security in the context of modern organisations and society to add value.


    Communicate effectively to design, evaluate, and respond to advances in technology in the cyber security context, future trends and industry standards and utilise a range of verbal, graphical and written forms, customised for diverse audiences including specialist and non- specialist clients, colleagues and industry personnel.

    Digital literacy

    Utilise a range of digital technologies and information sources to discover, select, analyse, synthesise, evaluate, critique, and disseminate both technical and professional information in the context of cyber security.

    Critical thinking

    Appraise complex information using critical and analytical thinking and judgement to identify problems, analyse user requirements and propose appropriate and innovative cybersecurity solutions.

    Evaluate the place and role of security systems, applications, and processes in organisational and societal contexts for reliability, usefulness, and the value they add to those contexts.

    Problem solving

    Generate cyber security solutions through the application of specialised theoretical constructs, expert skills, and critical analysis to real-world, ill-defined problems to develop appropriate and innovative cyber security solutions.


    Take personal, professional, and social responsibility within changing national and international professional IT and cybersecurity contexts; to develop autonomy as researchers and evaluate own performance for continuing professional development.

    Work autonomously and responsibly to create cyber security solutions to new situations and actively apply knowledge of theoretical constructs and methodologies to make informed decisions.


    Work independently and collaboratively towards achieving the outcomes of a group project, thereby demonstrating interpersonal skills including the ability to brainstorm, negotiate, resolve conflicts, manage difficult and awkward conversations, provide constructive feedback, and demonstrate the ability to function effectively in diverse professional, social and cultural contexts.

    Approved by Faculty Board 3 August 2023