CSU’s Graduate Certificate in Networking and Systems Administration offers an advanced course of study in the design, implementation and management of computer networks. Preparation for the world’s most popular industry certifications from major vendors such as Microsoft and Cisco is included as an integral part of the course.
This course is part of the Australian Government’s Job-Ready Graduates Package which means you can upskill or retrain for less. Start your Graduate Certificate in 2023 and save up to 71% on your course fees – read more here.
Commonwealth Supported Places 2023 Save up to 71% on your course fees* |
Duration 8 months part-time |
Intakes Six sessions a year |
Study mode Online |
Units of Study 4 subjects |
Ready to get started?
What is this course about?
The aim of the Graduate Certificate in Networking and Systems Administration is to provide computing professionals with a comprehensive overview of the theoretical and technical aspects of managing computer networks. The course also provides a pathway to Masters level study in the field of network administration.
Upon completion of the course graduates will be able to:
- Demonstrate and apply knowledge of current trends in network administration, particularly in the areas of service management, network architecture, routing and network configuration;
- Apply skills in the analysis and selection of routing methods and network addressing schemes, and in the design of Service Level Agreements;
- Effectively communicate networking concepts and solutions to people across an organisation, from end-users to upper management;
- Critically evaluate and reflect on ethical issues that relate to the IT discipline.
Abstract
This subject provides students with an introduction to contemporary computer networking concepts and instils the skills and knowledge required to design, configure and manage a small to medium sized network. Students will gain knowledge about the layered architectural design principles along with the technical standards required for establishing connectivity through such networks. The subject will introduce students to the current and emerging concepts in IP addressing, IP routing and switching to develop the skills required to design, implement and troubleshoot computer networks.
ITC542 Networking Fundamentals will cover the following topics:
- History of the internet.
- Layered networking architecture.
- Underlying technologies.
- IP addressing.
- Internetworking protocols.
- Routing protocols.
- Address and name management.
- Application and Transport layer protocols.
- Future of internetworking.
Assumed Knowledge
Familiarity with internet technologies and basic computer networking concepts.
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject allows students to develop skills that are necessary to identify ethical issues that are raised as a result of the advancement of information and communications technology (ICT). The subject will cover areas such as critical thinking, professionalism, ethical theories, privacy, security and crime in cyberspace, intellectual property, freedom of speech and regulation of the internet, systems reliability, and social and ethical issues of emerging technologies. By the end of the subject, students should be able to argue consistently and rationally about the moral problems raised by the adoption and use of ICT and propose solutions to those moral problems.
ITC506 Topics in Information Technology Ethics will cover the following topics:
- Introduction to ICT ethics.
- Introduction to critical thinking techniques.
- Professionalism and professional ethics.
- Ethical theories and analysis.
- Privacy.
- Security and crime in cyberspace.
- Intellectual property.
- Freedom of speech and Internet content regulation.
- Emerging technologies and ethics.
- ICT and Society.
Subject Availability
Session 1 (Feb), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides students with an in-depth knowledge of wireless communication systems. It starts with the discussion of wireless signals, their propagation mechanisms and the capacity of wireless systems for practical wireless communication scenarios. The subject then explores the working principles of wireless systems such as Wi-Fi and Wireless Local Area Networks. It further discusses emerging wireless communication systems and the challenging wireless security aspects for these systems.
ITC513 Wireless Communications will cover the following topics:
- Wireless signals and frequency spectrum
- Wireless systems and standards
- Wireless communication channels
- Antennas and wireless propagation
- Practical wireless networks
- Wireless communication security
- Emerging wireless communication technologies
Assumed Knowledge
A basic understanding of real life communication technologies.
Subject Availability
No offerings have been identified for this subject.
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject is designed to introduce students to systems administration of Linux servers that provide information services accessed through the internet. Students learn to operate servers via the command line, write scripts to automate management tasks, create and manage networked information services, and assess tools for improving data and service protection.
ITC514 Linux Server Administration will cover the following topics:
- Introduction to server administration
- Automating system tasks
- Data organisation
- Data Integrity
- Network administration
- Network services
- UNIX security
- Performance analysis
- Security management and policy
Assumed Knowledge
Basic understanding of TCP/IP and networking concepts.
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject introduces students to the programming process. It begins with the development of problem solving skills relevant to the solution of programming problems. This subject is one of the foundation subjects for other studies in information technology because it develops skills, techniques and approaches that underpin many other areas of the discipline of computing.
ITC558 Programming Principles will cover the following topics:
- The major steps in the programming process.
- Techniques for analysing programming problems.
- Variables and expressions.
- Control structures of sequence, selection, and iteration.
- Designing appropriate test data.
- Introduction to object orientation.
- Debugging techniques.
- Programming languages and their application areas.
Assumed Knowledge
Not available to students who have completed ITC106
Subject Availability
Session 1 (Feb)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides a broad study of various latest internet technologies and underlying communication technologies used in the Internet of Things (IoT). The main emphasis is to combine technical concepts with a high-level understanding of IoT networks and communication media used in the IoT. The subject provides a comprehensive understanding of the Internet of Things and explores topics such as IoT architecture, IoT communication protocols, security in IoT and IoT applications in the modern world. The subject also examines business use-cases of IoT in real-world environments such as industrial and home automation.
ITC560 - Internet of Things will cover the following topics:
- Introduction and overview of IoT.
- IoT and web of things.
- IoT architecture.
- IoT building blocks.
- IoT communication protocols.
- Security in IoT.
- IoT applications and business use-cases.
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides students with an in-depth study of cloud computing technologies and their use in business. It looks into various standards based cloud systems and architectures. It further discusses various cloud delivery models, planning for migration to a cloud model. It also discusses governance and security issues in a cloud model and managing the cloud infrastructure.
ITC561 - Cloud Computing will cover the following topics:
- Fundamentals of Cloud Computing.
- Cloud Architectures.
- Cloud Delivery Models.
- Cloud Risk Management.
- Cloud Security.
- Planning a migration to the Cloud.
- Cloud Governance and Management.
- Managing the Cloud Infrastructure.
Subject Availability
Session 1 (Feb)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject focuses on issues surrounding cloud computing privacy and security and their application to business. It discusses the governance framework that must underpin and define the processes for determining risk, privacy and security issues for an enterprise which uses a cloud model. It will examine the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business.
ITC568 Cloud Privacy and Security will cover the following topics:
- Governance and auditing for cloud operations.
- Threats, risk and requirements landscape.
- Privacy, data and digital identity.
- Data sensitivity, location and legal jurisdiction.
- Cloud security approaches and challenges.
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
ITC593 provides the practical knowledge and skills needed to analyse and work with network security protocols and standards, along with an in-depth introduction to the field of cryptography. The subject explores how contemporary encryption algorithms, digital signatures and cryptographic hash functions are used to implement various security goals, such as authentication, confidentiality and integrity. It also includes a comprehensive coverage of emerging security trends in modern IT infrastructure.
ITC593 - Network Security and Cryptography will cover the following topics:
- Introduction to computer and network security.
- Cryptography and its applications in network security.
- Secret key (symmetric) algorithms.
- Public key (asymmetric) algorithms.
- Modes of operation.
- RSA algorithm;
- Authentication systems.
- TLS and IP security
- User authentication & Kerberos.
- Key Management & Public key infrastructure (PKI).
- Emerging trends and challenges of network security
Assumed Knowledge
ITC595 Information Security
Subject Availability
Session 2 (Jul), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
In this subject, students will analyse and apply content from the eight domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. This subject will also help students prepare for the Certified Information Systems Security Professional (CISSP) industry certification exam from the International Information Systems Security Certification Consortium (ISC2).
ITE514 Professional Systems Security will cover the following topics:
- Access Control
- Application Development Security
- Business Continuity and Disaster Recovery planning
- Information Security Risk and Governance
- Cryptography
- Legal, Regulations, Investigations and Compliance
- Operations Security
- Physical (Environmental) Security
- Security Architecture and Design
- Telecommunications Security
Assumed Knowledge
ITI581 Cyber Security Fundamentals or equivalent
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
In this subject, students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.
ITE516 Hacking Countermeasures will cover the following topics:
- Footprinting, scanning and enumeration
- System hacking and penetration testing
- Trojans, back doors, viruses and worms
- Network traffic sniffing
- Denial of service
- Social engineering
- Identifying and exploiting network vulnerabilities
- Cross-site scripting and SQL injection
- Physical security
- Evading IDS, firewalls and honeypots
- Buffer overflows
- Cryptography
Assumed Knowledge
ITI581 Cyber Security Fundamentals or ITC595 Information Security
Subject Availability
Session 1 (Feb), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
The subject explores the installation, configuration, and management of VMware vSphere virtualisation software. The subject will help students prepare to take the examination to become a VMware Certified Professional.
ITE523 Virtualisation will cover the following topics:
- Introduction to virtualisation concepts and VMware vSphere
- Installing and managing core vSphere components such as vCenter Server, the Platform Services Controller and vSphere Update Manager
- Connecting storage and network infrastructure into a vSphere environment
- Provisioning and managing virtual machines and their access to CPU, memory, storage and network resources
- Managing security within a vSphere environment
- Providing high availability to virtual workloads within a vSphere environment
- Managing scalability within a vSphere environment
- Patching and updating vSphere components and virtual machines
Subject Availability
Session 1 (Feb)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
The aim of this subject is to enable students to plan, deploy, optimise and maintain Microsoft Servers. Students will learn how to analyse network performance and create an optimisation strategy, design and apply a network security policy, analyse and configure Core Network Services, and design and implement an Active Directory solution. Students will also prepare for Microsoft industry certification exams during this subject.
ITE527 Server Administration will cover the following topics:
- Server installation and configuration
- Network security Policies
- Active Directory
- Group Policy
- Virtualisation
- File and print services
- Domain Controllers
- Network access protection
- Audit policies
- Service authentication
- Network deployment
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject will help students prepare for the Amazon Web Services (AWS) Certified Solutions Architect industry certification. Students will study important characteristics of a successful cloud-based implementation, including those that relate to scalability, security, reliability, durability, and cost effectiveness. This learning will be applied through the design of an optimal cloud-based system in accordance with a set of project requirements.
ITE531 Architecting Cloud Solutions will cover the following topics:
- Designing cloud-based systems
- Cloud implementation and deployment
- Project costing
- Deployment management
- Network design
- Data storage
- Cloud-based security
- Scalability and elasticity
- Cloud migration and hybrid architecture
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Hear more about subject ITE531: Architecting Cloud Solutions from a previous lecturer:
Abstract
This subject focuses on container virtualisation using open-source technologies that automate the deployment of applications. Students of the subject will create and run their own custom container environment, from the base operating system through to the entire container platform. Students will also study the appropriate use of different container types and how to apply them in a business context.
ITE532 Containers and Virtualisation will cover the following topics:
- Container fundamentals
- Containers versus virtual machines
- Different container technologies
- Configuring a container engine
- Container virtual networking
- Container orchestration and clustering
- Images and containers
- Working with remote repositories
- Security and isolation
- Troubleshooting
- Monitoring and alerting
- Controlling running containers
- Containers in a business context
Subject Availability
Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject helps prepare students for the Certified Information Systems Management Certification (CISM), which is an international industry certification developed by ISACA. Students in this subject will investigate how to establish and maintain an information security governance framework along with the supporting processes to ensure that an organisation's information security strategy is aligned with its goals and objectives.
ITE533 Cyber Security Management will cover the following topics:
- Information security governance
- Information security strategy
- Security requirements
- Risk management and compliance
- Security policies
- Asset classification models
- Program development and management
- Security incident management
Subject Availability
Session 2 (Jul)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject provides students with knowledge of cyber security principles along with industry-based vendor-neutral IT security knowledge and skills. In particular, the subject helps students prepare for the Security+ industry qualification which has been developed by the International Computer Technology Industry Association (CompTIA). Students will also be introduced to a broad range of cyber security related topics such as infrastructure security, communications network security, cryptography, access control, authentication, external threats, and operational and organisational security. At the completion of this subject, students will be able to apply these concepts to protect computing infrastructure from cyber security threats and attacks.
ITI581 Cyber Security Fundamentals will cover the following topics:
- Introduction to network and cyber security
- Network design elements and components
- Compliance and operational security
- Cyber security threats and vulnerabilities
- Types of cyber attacks
- Risk mitigation strategies
- Appropriate security controls
- Disaster recovery plans and procedures
- Application, data and host security
- Access control and identity management
- Cryptography introduction
- Intrusion detection systems
- Preparing for CompTIA Security+ certification
Subject Availability
Term 1 (Jan), Session 1 (Feb), Term 2 (May), Session 2 (Jul), Term 3 (Aug), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Abstract
This subject discusses how to communicate effectively, and efficiently in professional environments. Students who undertake this subject will gain a wide range of practical communication skills supported by the latest intellectual and psychological behavioural theory. This subject explores the details of how and why humans communicate in certain ways and will equip students to communicate at all levels of professional business for effective outcomes. Students are encouraged to challenge their own communication habits and to undergo a journey of personal change through this subject.
MGI521 Professional Communications will cover the following topics:
- Communication Psychology of Knowledge Exchange
- Business Language & Document Writing
- Digital Communications & The Media Experience
- Creating Business Proposals & Reports
- Digital Presentations & Tools
- Selling & Obtaining Buy-In
- Facilitating Workshops & Meetings
- Managing Business Conflict & Negotiation
- Differences Between Leadership, Management & Mentors
- Personal Presentations & Public Speaking
Subject Availability
Session 1 (Feb), Session 2 (Jul), Session 3 (Nov)
The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.
Note: Assessment items are subject to change. Your official subject assessments should be confirmed in your online Subject Outline upon enrolment in that subject.
Sample Assessment
Assessments in your subjects will take a variety of forms, all designed to test and enhance your learning. You might be called upon to sit an exam, write a marketing plan, design an application, produce a video presentation, sit a quiz or any number of tasks. Why not try a small sample based on the exam from the subject ITE514 – Professional Systems Security?
- Why is prevention alone NOT enough to deal with attackers?
- Because upkeep of preventive measures is labour intensive
- Because it is difficult to implement preventive measures
- Because prevention alone is an expensive option
- Because even the best preventive measures are subject to failure
- Which of these choices best describes a buffer overflow attack?
- The input data exceeds the memory allocated for it.
- A buffer overflow is the common result of a SYN flood attack.
- Data formatted differently than expected by the receiving process.
- There is insufficient input data to fill the programs memory buffer.
- In a /24 subnet, the address x.x.x.255 BEST represents which of the following?
- An unusable address
- A broadcast address
- A standard IP address
- A network address
- What is NOT a method of social engineering?
- Impersonating a corporate VP over the phone
- Sending an e-mail that persuades a user to open a dangerous attachment
- Dumpster diving for sensitive corporate information
- Sending a popup window asking the user to re-authenticate
- Which of the following characterizes UDP as compared to TCP?
- More complex
- Connection oriented
- Faster
- Guaranteed delivery
- What specific action did the Melissa virus take that caused it to spread so fast?
- It broadcast itself to remote hosts with a spoofed address, echoing it to machines all over the Internet.
- It mailed itself to the first 50 entries in a victim’s Microsoft Outlook address book.
- It invaded root DNS servers, pointing addresses everywhere to infected hosts.
- It opened a user’s Internet Explorer browser to a site with the virus.
- Which of the following is FALSE about loopback addresses?
- They are assigned by the local ISP.
- They fall into the range 127.0.0.0/8.
- They are non-routable on the Internet.
- They are often used by services that must contact other services running on the same machine
- Network systems are located at different locations within our environment. Which of the following sections would be the best location for a web server that you want external customers to access?
- Semi-public
- Public
- Private
- Intranet
- Which of the following is the main problem with default passwords?
- They are difficult for valid users to guess.
- Frequently administrators do not know they are there and attackers do.
- They are usually hard to obtain.
- A default password can never be removed from a system.
Answers: D, A, B, C, C, B, A, A, B.
Applicants without a tertiary qualification may be admitted to the Graduate Certificate in Networking and Systems Administration on the basis of professional attainment and/or work experience.
Upon successful completion of the Graduate Certificate, students will also be eligible for admission to the Master of Networking and Systems Administration.
Information on applying can be found on the How to Apply help page.
Master of Networking and Systems Administration
The Graduate Certificate in Networking and Systems Administration is designed in partnership with the Master of Networking and Systems Administration. The Graduate Certificate can be stand alone or, upon successful completion, students may proceed (with full credit) into the Master of Networking and Systems Administration.
Domestic Students $3600 AUD per subject |
International Students $3820 AUD per subject |
Students who complete a Graduate Certificate and then choose to proceed into the Master of Networking and Systems Administration attract a 10% alumni discount on their fees for their Masters enrolment.
More information on Fees can be found on the Fees page.
If you want to reduce your cost per course you may be eligible for credit.
Academic credit is available to students who can provide proof they have passed relevant industry certification examinations or who have completed previous study. No fees are charged for subjects students receive credit for.
Prospective students can obtain an estimate of credit entitlements from Industry Examinations by filling out the Credit Eligibility Form.
NOTE: The actual level of credit awarded will be confirmed upon acceptance into the Degree.
Find out more with a personalised assessment of your eligibility, or apply now!