Enrolments: 561,736

Master Degree and Graduate Certificate Course Enrolments: 8,865

The total number of Master degree and Graduate Certificate enrolments since Charles Sturt University and IT Masters launched our first qualification in 2003.

Short Course Enrolments: 552,871

The total number of enrolments in our free short courses that we offer as a taster of what it is like to study via Distance Education with Charles Sturt University.

Student Testimonials

Master of Networking and Systems Administration

CSU’s Master of Networking and Systems Administration offers an advanced course of study in the design, implementation and management of computer networks. Preparation for the world’s most popular industry certifications from major vendors such as Microsoft and Cisco is included as an integral part of the course.

Enter through the Graduate Certificate pathway in 2023 and save on the total cost of your Masters degree with a Commonwealth Supported Place (CSP) as part of the federal government’s Job-Ready Graduates Package.

Duration
2 years part-time
Intakes
Six sessions a year
Study mode
Online
Units of Study
12 subjects
Course Details

What is this course about?

The aim of the Master of Networking and Systems Administration is to provide computing professionals with the theoretical knowledge and technical and communication skills necessary to design and manage complex networking architectures. The course also provides a pathway to doctorate level study in the field of network administration and management.

Upon completion of the course graduates will be able to:

  • demonstrate and apply knowledge of current trends in network management, particularly in the areas of network security, service management, network architecture, routing and network configuration;
  • investigate emerging trends in computer networking;
  • apply skills in the analysis and selection of routing methods and network addressing schemes, secure network design, server administration, and the design of Service Level Agreements;
  • effectively communicate networking concepts and solutions to people across an organisation, from end-users to upper management;
  • critically evaluate and reflect on ethical issues that relate to the IT discipline;
  • employ research skills that apply to the practice of network administration in a professional context;
  • demonstrate application of knowledge and skills through a capstone experience.

Subjects

Core Subjects
ITC506
Topics in Information Technology Ethics
ITC542
Networking Fundamentals
ITC571
Emerging Technologies and Innovation
ITI581
Cyber Security Fundamentals

Abstract

This subject allows students to develop skills that are necessary to identify ethical issues that are raised as a result of the advancement of information and communications technology (ICT). The subject will cover areas such as critical thinking, professionalism, ethical theories, privacy, security and crime in cyberspace, intellectual property, freedom of speech and regulation of the internet, systems reliability, and social and ethical issues of emerging technologies. By the end of the subject, students should be able to argue consistently and rationally about the moral problems raised by the adoption and use of ICT and propose solutions to those moral problems.

ITC506 Topics in Information Technology Ethics will cover the following topics:

  • Introduction to ICT ethics.
  • Introduction to critical thinking techniques.
  • Professionalism and professional ethics.
  • Ethical theories and analysis.
  • Privacy.
  • Security and crime in cyberspace.
  • Intellectual property.
  • Freedom of speech and Internet content regulation.
  • Emerging technologies and ethics.
  • ICT and Society.

Subject Availability

Session 1 (Feb), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides students with an introduction to contemporary computer networking concepts and instils the skills and knowledge required to design, configure and manage a small to medium sized network. Students will gain knowledge about the layered architectural design principles along with the technical standards required for establishing connectivity through such networks. The subject will introduce students to the current and emerging concepts in IP addressing, IP routing and switching to develop the skills required to design, implement and troubleshoot computer networks.

ITC542 Networking Fundamentals will cover the following topics:

  • History of the internet.
  • Layered networking architecture.
  • Underlying technologies.
  • IP addressing.
  • Internetworking protocols.
  • Routing protocols.
  • Address and name management.
  • Application and Transport layer protocols.
  • Future of internetworking.

Assumed Knowledge

Familiarity with internet technologies and basic computer networking concepts.

Subject Availability

Session 2 (Jul)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

*Capstone subject. This subject should be completed in the final session of study

Abstract

This subject requires research and project work, at an advanced level, on a topic related to emerging technologies and innovation. In the context of professional practice, students will draw upon prior learning in their Masters course to execute an independent capstone project in a selected topic related to their course and specialisation(s) within their course (where applicable).

ITC571 Emerging Technologies and Innovation will cover the following topics:

  • Introduction and selecting a capstone topic area to review.
  • Project design, planning, execution and reporting.
  • Building industry connections.
  • Research Skills: locating and evaluating information, credibility of sources and referencing.
  • Extracting information from readings for critical analysis.
  • Preparing and writing a literature review or capstone report.
  • Presenting your project.

Subject Availability

Session 1 (Feb), Session 2 (Jul), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides students with knowledge of cyber security principles along with industry-based vendor-neutral IT security knowledge and skills. In particular, the subject helps students prepare for the Security+ industry qualification which has been developed by the International Computer Technology Industry Association (CompTIA).  Students will also be introduced to a broad range of cyber security related topics such as infrastructure security, communications network security, cryptography, access control, authentication, external threats, and operational and organisational security. At the completion of this subject, students will be able to apply these concepts to protect computing infrastructure from cyber security threats and attacks.

ITI581 Cyber Security Fundamentals will cover the following topics:

  • Introduction to network and cyber security
  • Network design elements and components
  • Compliance and operational security
  • Cyber security threats and vulnerabilities
  • Types of cyber attacks
  • Risk mitigation strategies
  • Appropriate security controls
  • Disaster recovery plans and procedures
  • Application, data and host security
  • Access control and identity management
  • Cryptography introduction
  • Intrusion detection systems
  • Preparing for CompTIA Security+ certification

Subject Availability

Term 1 (Jan), Session 1 (Feb), Term 2 (May), Session 2 (Jul), Term 3 (Aug), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
ITE523
Virtualisation
MGI521
Professional Communications

Abstract

The subject explores the installation, configuration, and management of VMware vSphere virtualisation software. The subject will help students prepare to take the examination to become a VMware Certified Professional.

ITE523 Virtualisation will cover the following topics:

  • Introduction to virtualisation concepts and VMware vSphere
  • Installing and managing core vSphere components such as vCenter Server, the Platform Services Controller and vSphere Update Manager
  • Connecting storage and network infrastructure into a vSphere environment
  • Provisioning and managing virtual machines and their access to CPU, memory, storage and network resources
  • Managing security within a vSphere environment
  • Providing high availability to virtual workloads within a vSphere environment
  • Managing scalability within a vSphere environment
  • Patching and updating vSphere components and virtual machines

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject discusses how to communicate effectively, and efficiently in professional environments. Students who undertake this subject will gain a wide range of practical communication skills supported by the latest intellectual and psychological behavioural theory. This subject explores the details of how and why humans communicate in certain ways and will equip students to communicate at all levels of professional business for effective outcomes. Students are encouraged to challenge their own communication habits and to undergo a journey of personal change through this subject.

MGI521 Professional Communications will cover the following topics:

  • Communication Psychology of Knowledge Exchange
  • Business Language & Document Writing
  • Digital Communications & The Media Experience
  • Creating Business Proposals & Reports
  • Digital Presentations & Tools
  • Selling & Obtaining Buy-In
  • Facilitating Workshops & Meetings
  • Managing Business Conflict & Negotiation
  • Differences Between Leadership, Management & Mentors
  • Personal Presentations & Public Speaking

Subject Availability

Session 1 (Feb), Session 2 (Jul), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
Group A: Elective Academic subjects (Choose 3 from):
ITC513
Wireless Communications
ITC514
Linux Server Administration
ITC558
Programming Principles
ITC560
Internet of Things

Abstract

This subject provides students with an in-depth knowledge of wireless communication systems. It starts with the discussion of wireless signals, their propagation mechanisms and the capacity of wireless systems for practical wireless communication scenarios. The subject then explores the working principles of wireless systems such as Wi-Fi and Wireless Local Area Networks. It further discusses emerging wireless communication systems and the challenging wireless security aspects for these systems.

ITC513 Wireless Communications will cover the following topics:

  • Wireless signals and frequency spectrum
  • Wireless systems and standards
  • Wireless communication channels
  • Antennas and wireless propagation
  • Practical wireless networks
  • Wireless communication security
  • Emerging wireless communication technologies

Assumed Knowledge

A basic understanding of real life communication technologies.

Subject Availability

No offerings have been identified for this subject.

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject is designed to introduce students to systems administration of Linux servers that provide information services accessed through the internet. Students learn to operate servers via the command line, write scripts to automate management tasks, create and manage networked information services, and assess tools for improving data and service protection.

ITC514 Linux Server Administration will cover the following topics:

  • Introduction to server administration
  • Automating system tasks
  • Data organisation
  • Data Integrity
  • Network administration
  • Network services
  • UNIX security
  • Performance analysis
  • Security management and policy

Assumed Knowledge

Basic understanding of TCP/IP and networking concepts.

Subject Availability

Session 2 (Jul)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject introduces students to the programming process. It begins with the development of problem solving skills relevant to the solution of programming problems. This subject is one of the foundation subjects for other studies in information technology because it develops skills, techniques and approaches that underpin many other areas of the discipline of computing.

ITC558 Programming Principles will cover the following topics:

  • The major steps in the programming process.
  • Techniques for analysing programming problems.
  • Variables and expressions.
  • Control structures of sequence, selection, and iteration.
  • Designing appropriate test data.
  • Introduction to object orientation.
  • Debugging techniques.
  • Programming languages and their application areas.

Assumed Knowledge

Not available to students who have completed ITC106

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides a broad study of various latest internet technologies and underlying communication technologies used in the Internet of Things (IoT). The main emphasis is to combine technical concepts with a high-level understanding of IoT networks and communication media used in the IoT. The subject provides a comprehensive understanding of the Internet of Things and explores topics such as IoT architecture, IoT communication protocols, security in IoT and IoT applications in the modern world. The subject also examines business use-cases of IoT in real-world environments such as industrial and home automation.

ITC560 - Internet of Things will cover the following topics:

  • Introduction and overview of IoT.
  • IoT and web of things.
  • IoT architecture.
  • IoT building blocks.
  • IoT communication protocols.
  • Security in IoT.
  • IoT applications and business use-cases.

Subject Availability

Session 2 (Jul)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
ITC561
Cloud Computing
ITC568
Cloud Privacy and Security
ITC593
Network Security and Cryptography

Abstract

This subject provides students with an in-depth study of cloud computing technologies and their use in business. It looks into various standards based cloud systems and architectures. It further discusses various cloud delivery models, planning for migration to a cloud model. It also discusses governance and security issues in a cloud model and managing the cloud infrastructure.

ITC561 - Cloud Computing will cover the following topics:

  • Fundamentals of Cloud Computing.
  • Cloud Architectures.
  • Cloud Delivery Models.
  • Cloud Risk Management.
  • Cloud Security.
  • Planning a migration to the Cloud.
  • Cloud Governance and Management.
  • Managing the Cloud Infrastructure.

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject focuses on issues surrounding cloud computing privacy and security and their application to business. It discusses the governance framework that must underpin and define the processes for determining risk, privacy and security issues for an enterprise which uses a cloud model. It will examine the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business.

ITC568 Cloud Privacy and Security will cover the following topics:

  • Governance and auditing for cloud operations.
  • Threats, risk and requirements landscape.
  • Privacy, data and digital identity.
  • Data sensitivity, location and legal jurisdiction.
  • Cloud security approaches and challenges.

Subject Availability

Session 2 (Jul)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

ITC593 provides the practical knowledge and skills needed to analyse and work with network security protocols and standards, along with an in-depth introduction to the field of cryptography. The subject explores how contemporary encryption algorithms, digital signatures and cryptographic hash functions are used to implement various security goals, such as authentication, confidentiality and integrity. It also includes a comprehensive coverage of emerging security trends in modern IT infrastructure.

ITC593 - Network Security and Cryptography will cover the following topics:

  • Introduction to computer and network security.
  • Cryptography and its applications in network security.
  • Secret key (symmetric) algorithms.
  • Public key (asymmetric) algorithms.
  • Modes of operation.
  • RSA algorithm;
  • Authentication systems.
  • TLS and IP security
  • User authentication & Kerberos.
  • Key Management & Public key infrastructure (PKI).
  • Emerging trends and challenges of network security

Assumed Knowledge

ITC595 Information Security

Subject Availability

Session 2 (Jul), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
Group B: Elective Industry subjects (Choose 3 from):
ITE514
Professional Systems Security
ITE516
Hacking Countermeasures
ITE526
Practical Internetworking
ITE527
Server Administration

Abstract

In this subject, students will analyse and apply content from the eight domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. This subject will also help students prepare for the Certified Information Systems Security Professional (CISSP) industry certification exam from the International Information Systems Security Certification Consortium (ISC2).

ITE514 Professional Systems Security will cover the following topics:

  • Access Control
  • Application Development Security
  • Business Continuity and Disaster Recovery planning
  • Information Security Risk and Governance
  • Cryptography
  • Legal, Regulations, Investigations and Compliance
  • Operations Security
  • Physical (Environmental) Security
  • Security Architecture and Design
  • Telecommunications Security 

Assumed Knowledge

ITI581 Cyber Security Fundamentals or equivalent

Subject Availability

Session 2 (Jul)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

In this subject, students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.

ITE516 Hacking Countermeasures will cover the following topics:

  • Footprinting, scanning and enumeration
  • System hacking and penetration testing
  • Trojans, back doors, viruses and worms
  • Network traffic sniffing
  • Denial of service
  • Social engineering
  • Identifying and exploiting network vulnerabilities
  • Cross-site scripting and SQL injection
  • Physical security
  • Evading IDS, firewalls and honeypots
  • Buffer overflows
  • Cryptography

Assumed Knowledge

ITI581 Cyber Security Fundamentals or ITC595 Information Security

Subject Availability

Session 1 (Feb), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides students with a knowledge of fundamental networking concepts and builds the capacity of students to design, evaluate and configure various network components and protocols. Students will also prepare for Cisco industry certification exams during this subject.

ITE526 Practical Internetworking will cover the following topics:

  • Building a simple network
  • Ethernet Local Area Networks (LAN)
  • Exploring the functions of routing
  • Wide Area Networks
  • Network environment management and troubleshooting networks
  • Expanding switched network
  • Routing concepts
  • Access Control Lists
  • Address space management
  • LAN extensions

Enrolment Restrictions

Incompatible with ITI521 Interconnecting Network Devices

Subject Availability

Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

The aim of this subject is to enable students to plan, deploy, optimise and maintain Microsoft Servers. Students will learn how to analyse network performance and create an optimisation strategy, design and apply a network security policy, analyse and configure Core Network Services, and design and implement an Active Directory solution. Students will also prepare for Microsoft industry certification exams during this subject.

ITE527 Server Administration will cover the following topics:

  • Server installation and configuration
  • Network security Policies
  • Active Directory
  • Group Policy
  • Virtualisation
  • File and print services
  • Domain Controllers
  • Network access protection
  • Audit policies
  • Service authentication
  • Network deployment

Subject Availability

Session 2 (Jul)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
ITE531
Architecting Cloud Solutions
ITE532
Containers and Virtualisation
ITE533
Cyber Security Management

Abstract

This subject will help students prepare for the Amazon Web Services (AWS) Certified Solutions Architect industry certification. Students will study important characteristics of a successful cloud-based implementation, including those that relate to scalability, security, reliability, durability, and cost effectiveness. This learning will be applied through the design of an optimal cloud-based system in accordance with a set of project requirements. 

ITE531 Architecting Cloud Solutions will cover the following topics:

  • Designing cloud-based systems
  • Cloud implementation and deployment
  • Project costing
  • Deployment management
  • Network design
  • Data storage
  • Cloud-based security
  • Scalability and elasticity
  • Cloud migration and hybrid architecture

Subject Availability

Session 2 (Jul)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Hear more about subject ITE531: Architecting Cloud Solutions from a previous lecturer:

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject focuses on container virtualisation using open-source technologies that automate the deployment of applications. Students of the subject will create and run their own custom container environment, from the base operating system through to the entire container platform. Students will also study the appropriate use of different container types and how to apply them in a business context.

ITE532 Containers and Virtualisation will cover the following topics:

  • Container fundamentals
  • Containers versus virtual machines
  • Different container technologies
  • Configuring a container engine
  • Container virtual networking
  • Container orchestration and clustering
  • Images and containers
  • Working with remote repositories
  • Security and isolation
  • Troubleshooting
  • Monitoring and alerting
  • Controlling running containers
  • Containers in a business context

Subject Availability

Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject helps prepare students for the Certified Information Systems Management Certification (CISM), which is an international industry certification developed by ISACA. Students in this subject will investigate how to establish and maintain an information security governance framework along with the supporting processes to ensure that an organisation's information security strategy is aligned with its goals and objectives.

ITE533 Cyber Security Management will cover the following topics:

  • Information security governance
  • Information security strategy
  • Security requirements
  • Risk management and compliance
  • Security policies
  • Asset classification models
  • Program development and management
  • Security incident management

Subject Availability

Session 2 (Jul)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Note: Assessment items are subject to change. Your official subject assessments should be confirmed in your online Subject Outline upon enrolment in that subject.

[/toggle]

Sample Assessments

Sample Assessment

Assessments in your subjects will take a variety of forms, all designed to test and enhance your learning. You might be called upon to sit an exam, write a marketing plan, design an application, produce a video presentation, sit a quiz or any number of tasks. Why not try a small sample based on the exam from the subject ITE514 – Professional Systems Security?

  1. Why is prevention alone NOT enough to deal with attackers?
    1. Because upkeep of preventive measures is labour intensive
    2. Because it is difficult to implement preventive measures
    3. Because prevention alone is an expensive option
    4. Because even the best preventive measures are subject to failure
  2. Which of these choices best describes a buffer overflow attack?
    1. The input data exceeds the memory allocated for it.
    2. A buffer overflow is the common result of a SYN flood attack.
    3. Data formatted differently than expected by the receiving process.
    4. There is insufficient input data to fill the programs memory buffer.
  3. In a /24 subnet, the address x.x.x.255 BEST represents which of the following?
    1. An unusable address
    2. A broadcast address
    3. A standard IP address
    4. A network address
  4. What is NOT a method of social engineering?
    1. Impersonating a corporate VP over the phone
    2. Sending an e-mail that persuades a user to open a dangerous attachment
    3. Dumpster diving for sensitive corporate information
    4. Sending a popup window asking the user to re-authenticate
  5. Which of the following characterizes UDP as compared to TCP?
    1. More complex
    2. Connection oriented
    3. Faster
    4. Guaranteed delivery
  6. What specific action did the Melissa virus take that caused it to spread so fast?
    1. It broadcast itself to remote hosts with a spoofed address, echoing it to machines all over the Internet.
    2. It mailed itself to the first 50 entries in a victim’s Microsoft Outlook address book.
    3. It invaded root DNS servers, pointing addresses everywhere to infected hosts.
    4. It opened a user’s Internet Explorer browser to a site with the virus.
  7. Which of the following is FALSE about loopback addresses?
    1. They are assigned by the local ISP.
    2. They fall into the range 127.0.0.0/8.
    3. They are non-routable on the Internet.
    4. They are often used by services that must contact other services running on the same machine
  8. Network systems are located at different locations within our environment. Which of the following sections would be the best location for a web server that you want external customers to access?
    1. Semi-public
    2. Public
    3. Private
    4. Intranet
  9. Which of the following is the main problem with default passwords?
    1. They are difficult for valid users to guess.
    2. Frequently administrators do not know they are there and attackers do.
    3. They are usually hard to obtain.
    4. A default password can never be removed from a system.

Answers: D, A, B, C, C, B, A, A, B.

Entry requirements

There are two pathways to entry into the Master of Networking and Systems Administration.

  1. An undergraduate degree from a recognised Australian tertiary institution (or equivalent).
  2. Professional attainment and/or work experience.

Applicants without a tertiary qualification may be admitted first to the Graduate Certificate in Networking and Systems Administration. Upon successful completion of the four subjects in the Graduate Certificate, students will then be admitted with full credit into the Master of Networking and Systems Administration to complete their remaining units of study.

Information on applying can be found on the How to Apply help page.

Graduate Certificate

The Master of Networking and Systems Administration is an articulated course that incorporates the Graduate Certificate in Networking and Systems Administration.  The certificate can be stand alone or, upon successful completion, students may proceed (with full credit) into the Master of Networking and Systems Administration.

Fees

Domestic Students
$3600 AUD per subject
International Students
$3820 AUD per subject

More information on Fees can be found on the Fees page

If you want to reduce your cost per course you may be eligible for credit. 

Credit

Academic credit is available to students who can provide proof they have passed relevant industry certification examinations or who have completed previous study. No fees are charged for subjects students receive credit for.  

Prospective students can obtain an estimate of credit entitlements from Industry Examinations by filling out the Credit Eligibility Form.

NOTE: The actual level of credit awarded will be confirmed upon acceptance into the Degree.

Find out more with a personalised assessment of your eligibility, or apply now!