Cybercrime is rapidly on the rise. Get qualified and help fill the global shortage of cyber security professionals. Learn the fundamentals, including encryption systems, access control and how network architecture and the internet is used to defend online data. Prepare for an in-demand and well-paid career across industries – from defence to media, health, business and more.
Course details
Course objectives
The main aim of the course is to provide graduates with the knowledge, skills and attitudes to be an ICT professional with particular skills in a chosen area. Graduates will be prepared for immediate professional employment, or further studies at honours or postgraduate level.
Students who successfully complete this course will be able to:
- Identify the need for cyber security and ICT solutions and elicit information from the relevant stakeholders about the requirements for the solution.
- Assess and analyse the appropriateness of methodologies and technologies for the design and implementation of cyber security and ICT solutions.
- Identify, investigate, and appraise cyber security situations by applying appropriate methodologies, practices, technologies, ethical and legal issues, utilising generic and specialised software tools used by cyber security professionals.
- Communicate effectively using written and oral communication skills in a professional context, adapt personal interaction style to a given audience, work efficiently in a team, guide and direct other team members.
- Plan and implement a cyber security strategy considering the requirements of the organisation and consult with stakeholders.
- Apply knowledge of the technologies that make up secure infrastructure to exploit and defend against idealised and real-life cyber security threats.
Course structure
For the completion of Bachelor of Cyber Security, students are required to complete a total of 24 units (300 credit points) consisting of:
- 8 units in core studies (100 credit points)
- 8 units of study from the Cyber Security Major (100 credit points)
- 8 units of other studies (100 credit points) comprising a co-major, minor, advanced minor, internship or electives)
Units of study
Core Units
8 units (100 credit points)
Units | Unit codes | Credit points |
---|---|---|
Introduction to Programming | COS10009 | 12.5 |
ICT Inquiry Project | ICT10022 | 12.5 |
Web Development | COS10005 | 12.5 |
Network and Switching | TNE10006 | 12.5 |
Technology in an Indigenous Context Project | COS10025 | 12.5 |
Network Administration | TNE10005 | 12.5 |
ICT Project A* | ICT30017 | 12.5 |
ICT Project B* | ICT30018 | 12.5 |
Major: Cyber Security
8 units (100 credit points)
Units | Unit codes | Credit points |
---|---|---|
Malware Analysis | COS20030 | 12.5 |
IT Security | COS30015 | 12.5 |
ICT Design Project | ICT20025 | 12.5 |
Network Routing Principles | TNE20002 | 12.5 |
Cyber Security Ethics, Law and Policy | LAW30030 | 12.5 |
ICT Innovation Project | ICT30016 | 12.5 |
Network Security and Resilience | TNE30009 | 12.5 |
Secure Remote Access Networks | TNE30012 | 12.5 |
Electives/Minor/Second Major
8 units in other studies (100 credit points)
Fees & scholarships
Fee*
* The indicative course fees shown here applies to students studying on-campus in Malaysia for the relevant year only. They are based on a standard study load per year. However, please note that fees are assessed according to a student’s study load in each semester, and variation to study load will result in an adjustment to tuition fees. All fees are subject to annual review and may be adjusted.
Scholarships
At Swinburne scholarships are about providing opportunity, promoting equity and recognising excellence and achievement. Scholarships are available for both commencing and current students.
Find your scholarship
Entry requirements
Entry Requirements
English Requirements
Application process
Apply for this course by following the step-by-step process from the links below.
- Learn more on the application process
Career opportunities
Graduates of this course will have developed extensive skills associated to the cyber security of systems, networks, and programs, and will have demonstrated contemporary technical abilities, teamwork, oral and written communication skills. Careers in this field include cyber analysts, penetration testers, security consultants, and information security officers.