For computing professionals wishing to further their expertise, the Master of Cloud Computing and Virtualisation provides the knowledge, capabilities and communication skills needed to design and manage complex cloud computing architectures in a business context.
Enter through the Graduate Certificate pathway in 2023 and save on the total cost of your Masters degree with a Commonwealth Supported Place (CSP) as part of the federal government’s Job-Ready Graduates Package.
Duration 2 years part-time |
Intakes Six sessions a year |
Study mode Online |
Units of Study 12 subjects |
The aim of the Master of Cloud Computing and Virtualisation is to provide computing professionals with the theoretical knowledge and technical and communication skills necessary to design and manage complex cloud computing architectures. The course also provides a pathway to doctorate level study within the computer networking, cloud computing and virtualisation discipline areas.
Upon completion of the course graduates will be able to:
- demonstrate and apply advanced knowledge of current trends in areas such as network administration, virtualisation, cloud security, and cloud-based networking architectures;
- investigate and critically reflect on emerging IT networking developments, particularly those that relate to cloud computing and virtualisation;
- apply appropriate technical skills and critical thinking techniques to solve complex computer networking problems using virtualisation and cloud-computing design principles and technologies;
- conduct a risk assessment on the deployment of corporate data to the cloud and to recommend appropriate procedural and technical controls to ensure security;
- effectively communicate cloud computing and virtualisation concepts and solutions to people across an organisation, from end-users to upper management;
- employ research skills relevant to the practice of cloud computing and virtualisation within a professional context; and
- demonstrate application of knowledge and skills through a capstone experience.
Abstract
This subject provides students with an in-depth study of cloud computing technologies and their use in business. It looks into various standards based cloud systems and architectures. It further discusses various cloud delivery models, planning for migration to a cloud model. It also discusses governance and security issues in a cloud model and managing the cloud infrastructure.
ITC561 - Cloud Computing will cover the following topics:
- Fundamentals of Cloud Computing.
- Cloud Architectures.
- Cloud Delivery Models.
- Cloud Risk Management.
- Cloud Security.
- Planning a migration to the Cloud.
- Cloud Governance and Management.
- Managing the Cloud Infrastructure.
Subject Availability
Session 1 (Feb)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject focuses on issues surrounding cloud computing privacy and security and their application to business. It discusses the governance framework that must underpin and define the processes for determining risk, privacy and security issues for an enterprise which uses a cloud model. It will examine the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business.
ITC568 Cloud Privacy and Security will cover the following topics:
- Governance and auditing for cloud operations.
- Threats, risk and requirements landscape.
- Privacy, data and digital identity.
- Data sensitivity, location and legal jurisdiction.
- Cloud security approaches and challenges.
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
*Capstone subject. This subject should be completed in the final session of study
Abstract
This subject requires research and project work, at an advanced level, on a topic related to emerging technologies and innovation. In the context of professional practice, students will draw upon prior learning in their Masters course to execute an independent capstone project in a selected topic related to their course and specialisation(s) within their course (where applicable).
ITC571 Emerging Technologies and Innovation will cover the following topics:
- Introduction and selecting a capstone topic area to review.
- Project design, planning, execution and reporting.
- Building industry connections.
- Research Skills: locating and evaluating information, credibility of sources and referencing.
- Extracting information from readings for critical analysis.
- Preparing and writing a literature review or capstone report.
- Presenting your project.
Subject Availability
Session 1 (Feb), Session 2 (Jul), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides a broad overview of information security concepts, with an emphasis on combating security threats to operating systems, computer programs, databases and networked systems. Students will also study foundational security policies that stipulate requirements about integrity, confidentiality and availability. Techniques for implementing these policies are also investigated, including memory management techniques, access control mechanisms, user authentication, and networking tools.
ITC595 Information Security will cover the following topics:
- Overview of computer security
- Applied Cryptography
- Authentication and Access Control
- Types of Security Threats and Attacks
- Operating System Security
- Network Security
- Database Security
- Cloud Computing Security
- Privacy
- Emerging topics in Cyber and Information Security
Subject Availability
Session 1 (Feb), Session 2 (Jul), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
The subject explores the installation, configuration, and management of VMware vSphere virtualisation software. The subject will help students prepare to take the examination to become a VMware Certified Professional.
ITE523 Virtualisation will cover the following topics:
- Introduction to virtualisation concepts and VMware vSphere
- Installing and managing core vSphere components such as vCenter Server, the Platform Services Controller and vSphere Update Manager
- Connecting storage and network infrastructure into a vSphere environment
- Provisioning and managing virtual machines and their access to CPU, memory, storage and network resources
- Managing security within a vSphere environment
- Providing high availability to virtual workloads within a vSphere environment
- Managing scalability within a vSphere environment
- Patching and updating vSphere components and virtual machines
Subject Availability
Session 1 (Feb)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject will help students prepare for the Amazon Web Services (AWS) Certified Solutions Architect industry certification. Students will study important characteristics of a successful cloud-based implementation, including those that relate to scalability, security, reliability, durability, and cost effectiveness. This learning will be applied through the design of an optimal cloud-based system in accordance with a set of project requirements.
ITE531 Architecting Cloud Solutions will cover the following topics:
- Designing cloud-based systems
- Cloud implementation and deployment
- Project costing
- Deployment management
- Network design
- Data storage
- Cloud-based security
- Scalability and elasticity
- Cloud migration and hybrid architecture
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Hear more about subject ITE531: Architecting Cloud Solutions from a previous lecturer:
Abstract
This subject focuses on container virtualisation using open-source technologies that automate the deployment of applications. Students of the subject will create and run their own custom container environment, from the base operating system through to the entire container platform. Students will also study the appropriate use of different container types and how to apply them in a business context.
ITE532 Containers and Virtualisation will cover the following topics:
- Container fundamentals
- Containers versus virtual machines
- Different container technologies
- Configuring a container engine
- Container virtual networking
- Container orchestration and clustering
- Images and containers
- Working with remote repositories
- Security and isolation
- Troubleshooting
- Monitoring and alerting
- Controlling running containers
- Containers in a business context
Subject Availability
Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides students with an in-depth knowledge of wireless communication systems. It starts with the discussion of wireless signals, their propagation mechanisms and the capacity of wireless systems for practical wireless communication scenarios. The subject then explores the working principles of wireless systems such as Wi-Fi and Wireless Local Area Networks. It further discusses emerging wireless communication systems and the challenging wireless security aspects for these systems.
ITC513 Wireless Communications will cover the following topics:
- Wireless signals and frequency spectrum
- Wireless systems and standards
- Wireless communication channels
- Antennas and wireless propagation
- Practical wireless networks
- Wireless communication security
- Emerging wireless communication technologies
Assumed Knowledge
A basic understanding of real life communication technologies.
Subject Availability
No offerings have been identified for this subject.
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject is designed to introduce students to systems administration of Linux servers that provide information services accessed through the internet. Students learn to operate servers via the command line, write scripts to automate management tasks, create and manage networked information services, and assess tools for improving data and service protection.
ITC514 Linux Server Administration will cover the following topics:
- Introduction to server administration
- Automating system tasks
- Data organisation
- Data Integrity
- Network administration
- Network services
- UNIX security
- Performance analysis
- Security management and policy
Assumed Knowledge
Basic understanding of TCP/IP and networking concepts.
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject will employ a research, reporting and presentation approach using the latest ICT tools to examine and critically analyse a combination of the technical and management issues in the administration of contemporary IT infrastructure. The subject will provide students with the essential knowledge of service and quality management processes and practices. Students will learn the applied knowledge of IT Service Management (ITSM) and will be introduced to the universal “Information Technology Infrastructure Library (ITIL)” framework which provides a cohesive set of best practices.
ITC540 IT Infrastructure Management PG will cover the following topics:
- Information systems, IT architecture and governance
- Data management and business intelligence
- Network management and mobility.
- Cybersecurity and risk management
- E-Commerce and mobile commerce
- Enterprise systems
- Introduction to IT service management (ITSM)
- Dimensions of Service Management
- Technology Infrastructure Library (ITIL) Service Value System
- ITIL Management Practices
- Best practice frameworks for IT service management
Subject Availability
Session 1 (Feb)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides students with an introduction to contemporary computer networking concepts and instils the skills and knowledge required to design, configure and manage a small to medium sized network. Students will gain knowledge about the layered architectural design principles along with the technical standards required for establishing connectivity through such networks. The subject will introduce students to the current and emerging concepts in IP addressing, IP routing and switching to develop the skills required to design, implement and troubleshoot computer networks.
ITC542 Networking Fundamentals will cover the following topics:
- History of the internet.
- Layered networking architecture.
- Underlying technologies.
- IP addressing.
- Internetworking protocols.
- Routing protocols.
- Address and name management.
- Application and Transport layer protocols.
- Future of internetworking.
Assumed Knowledge
Familiarity with internet technologies and basic computer networking concepts.
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject introduces students to the programming process. It begins with the development of problem solving skills relevant to the solution of programming problems. This subject is one of the foundation subjects for other studies in information technology because it develops skills, techniques and approaches that underpin many other areas of the discipline of computing.
ITC558 Programming Principles will cover the following topics:
- The major steps in the programming process.
- Techniques for analysing programming problems.
- Variables and expressions.
- Control structures of sequence, selection, and iteration.
- Designing appropriate test data.
- Introduction to object orientation.
- Debugging techniques.
- Programming languages and their application areas.
Assumed Knowledge
Not available to students who have completed ITC106
Subject Availability
Session 1 (Feb)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides a broad study of various latest internet technologies and underlying communication technologies used in the Internet of Things (IoT). The main emphasis is to combine technical concepts with a high-level understanding of IoT networks and communication media used in the IoT. The subject provides a comprehensive understanding of the Internet of Things and explores topics such as IoT architecture, IoT communication protocols, security in IoT and IoT applications in the modern world. The subject also examines business use-cases of IoT in real-world environments such as industrial and home automation.
ITC560 - Internet of Things will cover the following topics:
- Introduction and overview of IoT.
- IoT and web of things.
- IoT architecture.
- IoT building blocks.
- IoT communication protocols.
- Security in IoT.
- IoT applications and business use-cases.
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
ITC593 provides the practical knowledge and skills needed to analyse and work with network security protocols and standards, along with an in-depth introduction to the field of cryptography. The subject explores how contemporary encryption algorithms, digital signatures and cryptographic hash functions are used to implement various security goals, such as authentication, confidentiality and integrity. It also includes a comprehensive coverage of emerging security trends in modern IT infrastructure.
ITC593 - Network Security and Cryptography will cover the following topics:
- Introduction to computer and network security.
- Cryptography and its applications in network security.
- Secret key (symmetric) algorithms.
- Public key (asymmetric) algorithms.
- Modes of operation.
- RSA algorithm;
- Authentication systems.
- TLS and IP security
- User authentication & Kerberos.
- Key Management & Public key infrastructure (PKI).
- Emerging trends and challenges of network security
Assumed Knowledge
ITC595 Information Security
Subject Availability
Session 2 (Jul), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
In this subject, students will investigate the current threats to computing systems and networks along with effective countermeasures. Students will also learn the principles and stages of an appropriate security incident response. In addition, this subject will prepare students for the Global Information Assurance Certification (GIAC) and Certified Incident Handler (GCIH) industry certification exam.
ITE512 Incident Response will cover the following topics:
- Computer attack methods and vectors
- Security incident handling processes
- Legal and forensic issues of incident handling
- Computer and network attack countermeasures
- Platform and device-specific attacks and defences
- Application-level attacks and defences
- Recovery and restoration issues
Subject Availability
Session 1 (Feb)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
In this subject students will acquire an understanding of the principles of forensic investigation and the complexities involved in conducting forensic investigations in a contemporary context. Students will develop a deeper understanding of the methods for acquiring digital evidence from more contemporary, non-traditional, digital systems (such as social media sites, virtualised systems and multimedia platforms) using practical examples, case studies and activities. Students will also learn principles of investigating malware and ransomware attacks and solve the potential difficulties in these contexts.
ITE513 Forensic Investigation will cover the following topics:
- Computer forensics
- File System Forensic Analysis Part 1 - Volumes and FAT
- File System Forensic Analysis Part 2 - NTFS
- File Carving.
- Acquiring digital evidence
- Log file analysis
- Mobile device forensics (Android/GPS/SIM Cards)
- Malware analysis
- Ransomware analysis
- Image forgery
- Steganography & Steganalysis
Assumed Knowledge
It is assumed that students will have completed ITC597 or ITI581
Subject Availability
Session 2 (July)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
In this subject, students will analyse and apply content from the eight domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. This subject will also help students prepare for the Certified Information Systems Security Professional (CISSP) industry certification exam from the International Information Systems Security Certification Consortium (ISC2).
ITE514 Professional Systems Security will cover the following topics:
- Access Control
- Application Development Security
- Business Continuity and Disaster Recovery planning
- Information Security Risk and Governance
- Cryptography
- Legal, Regulations, Investigations and Compliance
- Operations Security
- Physical (Environmental) Security
- Security Architecture and Design
- Telecommunications Security
Assumed Knowledge
ITI581 Cyber Security Fundamentals or equivalent
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
In this subject, students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.
ITE516 Hacking Countermeasures will cover the following topics:
- Footprinting, scanning and enumeration
- System hacking and penetration testing
- Trojans, back doors, viruses and worms
- Network traffic sniffing
- Denial of service
- Social engineering
- Identifying and exploiting network vulnerabilities
- Cross-site scripting and SQL injection
- Physical security
- Evading IDS, firewalls and honeypots
- Buffer overflows
- Cryptography
Assumed Knowledge
ITI581 Cyber Security Fundamentals or ITC595 Information Security
Subject Availability
Session 1 (Feb), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides students with a knowledge of fundamental networking concepts and builds the capacity of students to design, evaluate and configure various network components and protocols. Students will also prepare for Cisco industry certification exams during this subject.
ITE526 Practical Internetworking will cover the following topics:
- Building a simple network
- Ethernet Local Area Networks (LAN)
- Exploring the functions of routing
- Wide Area Networks
- Network environment management and troubleshooting networks
- Expanding switched network
- Routing concepts
- Access Control Lists
- Address space management
- LAN extensions
Enrolment Restrictions
Incompatible with ITI521 Interconnecting Network Devices
Subject Availability
Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
The aim of this subject is to enable students to plan, deploy, optimise and maintain Microsoft Servers. Students will learn how to analyse network performance and create an optimisation strategy, design and apply a network security policy, analyse and configure Core Network Services, and design and implement an Active Directory solution. Students will also prepare for Microsoft industry certification exams during this subject.
ITE527 Server Administration will cover the following topics:
- Server installation and configuration
- Network security Policies
- Active Directory
- Group Policy
- Virtualisation
- File and print services
- Domain Controllers
- Network access protection
- Audit policies
- Service authentication
- Network deployment
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject helps prepare students for the Certified Information Systems Management Certification (CISM), which is an international industry certification developed by ISACA. Students in this subject will investigate how to establish and maintain an information security governance framework along with the supporting processes to ensure that an organisation's information security strategy is aligned with its goals and objectives.
ITE533 Cyber Security Management will cover the following topics:
- Information security governance
- Information security strategy
- Security requirements
- Risk management and compliance
- Security policies
- Asset classification models
- Program development and management
- Security incident management
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides students with knowledge of cyber security principles along with industry-based vendor-neutral IT security knowledge and skills. In particular, the subject helps students prepare for the Security+ industry qualification which has been developed by the International Computer Technology Industry Association (CompTIA). Students will also be introduced to a broad range of cyber security related topics such as infrastructure security, communications network security, cryptography, access control, authentication, external threats, and operational and organisational security. At the completion of this subject, students will be able to apply these concepts to protect computing infrastructure from cyber security threats and attacks.
ITI581 Cyber Security Fundamentals will cover the following topics:
- Introduction to network and cyber security
- Network design elements and components
- Compliance and operational security
- Cyber security threats and vulnerabilities
- Types of cyber attacks
- Risk mitigation strategies
- Appropriate security controls
- Disaster recovery plans and procedures
- Application, data and host security
- Access control and identity management
- Cryptography introduction
- Intrusion detection systems
- Preparing for CompTIA Security+ certification
Subject Availability
Term 1 (Jan), Session 1 (Feb), Term 2 (May), Session 2 (Jul), Term 3 (Aug), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Note: Assessment items are subject to change. Your official subject assessments should be confirmed in your online Subject Outline upon enrolment in that subject.
Assessments in your subjects will take a variety of forms, all designed to test and enhance your learning. You might be called upon to sit an exam, write a marketing plan, design an application, produce a video presentation, sit a quiz or any number of tasks. Why not try a small sample based on the exam from the subject ITE514 – Professional Systems Security?
- Why is prevention alone NOT enough to deal with attackers?
- Because upkeep of preventive measures is labour intensive
- Because it is difficult to implement preventive measures
- Because prevention alone is an expensive option
- Because even the best preventive measures are subject to failure
- Which of these choices best describes a buffer overflow attack?
- The input data exceeds the memory allocated for it.
- A buffer overflow is the common result of a SYN flood attack.
- Data formatted differently than expected by the receiving process.
- There is insufficient input data to fill the programs memory buffer.
- In a /24 subnet, the address x.x.x.255 BEST represents which of the following?
- An unusable address
- A broadcast address
- A standard IP address
- A network address
- What is NOT a method of social engineering?
- Impersonating a corporate VP over the phone
- Sending an e-mail that persuades a user to open a dangerous attachment
- Dumpster diving for sensitive corporate information
- Sending a popup window asking the user to re-authenticate
- Which of the following characterizes UDP as compared to TCP?
- More complex
- Connection oriented
- Faster
- Guaranteed delivery
- What specific action did the Melissa virus take that caused it to spread so fast?
- It broadcast itself to remote hosts with a spoofed address, echoing it to machines all over the Internet.
- It mailed itself to the first 50 entries in a victim’s Microsoft Outlook address book.
- It invaded root DNS servers, pointing addresses everywhere to infected hosts.
- It opened a user’s Internet Explorer browser to a site with the virus.
- Which of the following is FALSE about loopback addresses?
- They are assigned by the local ISP.
- They fall into the range 127.0.0.0/8.
- They are non-routable on the Internet.
- They are often used by services that must contact other services running on the same machine
- Network systems are located at different locations within our environment. Which of the following sections would be the best location for a web server that you want external customers to access?
- Semi-public
- Public
- Private
- Intranet
- Which of the following is the main problem with default passwords?
- They are difficult for valid users to guess.
- Frequently administrators do not know they are there and attackers do.
- They are usually hard to obtain.
- A default password can never be removed from a system.
Answers: D, A, B, C, C, B, A, A, B.
There are two pathways to entry into the Master of Cloud Computing and Virtualisation .
- An undergraduate degree from a recognised Australian tertiary institution (or equivalent).
- Professional attainment and/or work experience.
Applicants without a tertiary qualification may be admitted first to the Graduate Certificate in Cloud Computing and Virtualisation. Upon successful completion of the four subjects in the Graduate Certificate, students will then be admitted with full credit into the Master of Cloud Computing and Virtualisation to complete their remaining units of study.
Information on applying can be found on the How to Apply help page.
Graduate Certificate
The Master of Cloud Computing and Virtualisation is an articulated course that incorporates the Graduate Certificate in Cloud Computing and Virtualisation. The certificate can be stand alone or, upon successful completion, students may proceed (with full credit) into the Masters of Cloud Computing and Virtualisation.
Domestic Students $3600 AUD per subject |
International Students $3820 AUD per subject |
More information on Fees can be found on the Fees page. If you want to reduce your cost per course you may be eligible for credit.
Academic credit is available to students who can provide proof they have passed relevant industry certification examinations or who have completed previous study. No fees are charged for subjects students receive credit for.
Prospective students can obtain an estimate of credit entitlements from Industry Examinations by filling out the Credit Eligibility Form.
NOTE: The actual level of credit awarded will be confirmed upon acceptance into the Degree.
Find out more with a personalised assessment of your eligibility, or apply now!