Course Overview

Master of Cloud Computing and Virtualisation

As a graduate of the Master of Cloud Computing and Virtualisation, you’ll have the specialised skills and knowledge to transition into managerial roles in cloud computing in Australia and overseas. You could work as a cloud architect, cloud designer, network designer or cloud security specialist, or establish your own consultancy.

Upon completion of the course graduates will be able to:

  • demonstrate and apply advanced knowledge of current trends in areas such as network administration, virtualisation, cloud security, and cloud-based networking architectures;
  • investigate and critically reflect on emerging IT networking developments, particularly those that relate to cloud computing and virtualisation;
  • apply appropriate technical skills and critical thinking techniques to solve complex computer networking problems using virtualisation and cloud-computing design principles and technologies;
  • conduct a risk assessment on the deployment of corporate data to the cloud and to recommend appropriate procedural and technical controls to ensure security;
  • effectively communicate cloud computing and virtualisation concepts and solutions to people across an organisation, from end-users to upper management;
  • employ research skills relevant to the practice of cloud computing and virtualisation within a professional context; and
  • demonstrate application of knowledge and skills through a capstone experience.

Why Study Cloud Computing With Us?


Study on Your Terms: 100% Online

Our computing course is entirely online, designed for flexibility. Access lectures, forums, assignments, and enjoy 24/7 tech support, all with a simple mouse click.


Equipped for Real-World Success

Crafted with insights from industry stalwarts and delivered by experienced academics, our course is a passport to a thriving career in computing and IT. As Charles Sturt stands as one of Australia’s foremost IT educators, rest assured you’re learning from the best.


Tailored Learning for Your Ambitions

Choose two academic and two industry-centric subjects, allowing you to align your degree with your aspirations. From cloud exploration to cyber security and digital marketing, chart your unique educational journey.


Cloud Computing Career Opportunities


Armed with the Graduate Certificate of Cloud Computing and Virtualisation, you’ll be primed for leadership positions in cloud computing across Australia and abroad. Whether you see yourself as a cloud architect, network designer, cloud security expert, or even spearheading your own consultancy, the sky’s the limit

Start you studies with Expert Guidance!


Complete the form below to chat to one of our friendly course advisors.

Entry requirements

There are two pathways to entry into the Master of Cloud Computing and Virtualisation.

  • An undergraduate degree from a recognised Australian tertiary institution (or equivalent).
  • Professional attainment and/or work experience.

Applicants without a tertiary qualification are encouraged to begin with the Graduate Certificate in Cloud Computing and Virtualisation. Upon successful completion of the certificate’s four subjects, students will be granted credit and can transition into the Master of Cloud Computing and Virtualisation to conclude their studies.

For detailed application procedures, please refer to the ‘How to Apply’ help page.


Domestic Student

$3890 AUD per subject

International Student

$4124 AUD per subject

More information on Fees can be found on the Fees page. If you want to reduce your cost per course you may be eligible for credit.


If you’ve acquired some industry certification or completed prior post graduate study, you might be eligible for some academic credit. And here’s some good news – you won’t be charged fees for any subjects you get credit for.

Want a rough idea of the credits you might score from Industry Exams? Just fill out our Credit and Eligibility Form.

We’ll be able to confirm your credit once you’re officially enrolled.

Sample Assessment

Assessments in your subjects will take a variety of forms, all designed to test and enhance your learning. You might be called upon to sit an exam, write a marketing plan, design an application, produce a video presentation, sit a quiz or any number of tasks. Why not try a small sample based on the exam from the subject ITE514 – Professional Systems Security?

  1. Because upkeep of preventive measures is labour intensive
  2. Because it is difficult to implement preventive measures
  3. Because prevention alone is an expensive option
  4. Because even the best preventive measures are subject to failure
Answer: D
  1. The input data exceeds the memory allocated for it.
  2. A buffer overflow is the common result of a SYN flood attack.
  3. Data is formatted differently than expected by the receiving process.
  4. There is insufficient input data to fill the program’s memory buffer.
Answer: A
  1. An unusable address
  2. A broadcast address
  3. A standard IP address
  4. A network address
Answer: B
  1. Impersonating a corporate VP over the phone
  2. Sending an e-mail that persuades a user to open a dangerous attachment
  3. Dumpster diving for sensitive corporate information
  4. Sending a popup window asking the user to re-authenticate
Answer: C
  1. More complex
  2. Connection oriented
  3. Faster
  4. Guaranteed delivery
Answer: C
  1. It broadcast itself to remote hosts with a spoofed address, echoing it to machines all over the Internet.
  2. It mailed itself to the first 50 entries in a victim’s Microsoft Outlook address book.
  3. It invaded root DNS servers, pointing addresses everywhere to infected hosts.
  4. It opened a user’s Internet Explorer browser to a site with the virus.
Answer: B
  1. They are assigned by the local ISP.
  2. They fall into the range
  3. They are non-routable on the Internet.
  4. They are often used by services that must contact other services running on the same machine
Answer: A
  1. Semi-public
  2. Public
  3. Private
  4. Intranet
Answer: A
  1. They are difficult for valid users to guess.
  2. Frequently administrators do not know they are there and attackers do.
  3. They are usually hard to obtain.
  4. A default password can never be removed from a system.
Answer: B

Free Short Courses

If you are considering enrolling in one of our unique Master degrees, why not ‘try before you enrol’? Enrolling in these webinar-based free short courses allows insight into how we create a collaborative learning environment, and is also an opportunity to engage with other students and build networks. Passing course exams will earn you a certificate of achievement, and may even qualify you for credit – successfully complete 3 or more short courses and be eligible for 1 industry elective credit.