Course Overview

Master of Cyber Security

As an IT or computing expert, Charles Sturt University’s Master of Cyber Security offers you the chance to deepen your expertise in cyber security. This advanced program empowers you to move into specialised cyber roles.

Offered online and boasting accreditation from the Australian Computer Society, our course isn’t just about theory. We delve into the nitty-gritty of today’s cyber landscape, covering hot topics like digital forensics, counter-hacking strategies, and the intricate world of cyberwarfare and terrorism

Upon completion of this course, graduates will be able to :

  • demonstrate and apply knowledge of current trends in ICT security, particularly those that relate to security protocols, policy, and security protection mechanisms;
  • investigate emerging security trends;
  • apply skills in the identification of security threats, implementation of secure system properties, and incident response;
  • effectively communicate IT security concepts and solutions in a variety of professional settings;
  • critically evaluate and reflect on ethical issues that relate to the IT discipline.

Why Study Cyber Security With Us?

 

Study on Your Terms: 100% Online

Our computing course is entirely online, designed for flexibility. Access lectures, forums, assignments, and enjoy 24/7 tech support, all with a simple mouse click.

 

Equipped for Real-World Success

Crafted with insights from industry stalwarts and delivered by experienced academics, our course is a passport to a thriving career in computing and IT. As Charles Sturt stands as one of Australia’s foremost IT educators, rest assured you’re learning from the best.

 

Tailored Learning for Your Ambitions

Choose two academic and two industry-centric subjects, allowing you to align your degree with your aspirations. From cloud exploration to cyber security and digital marketing, chart your unique educational journey.

 

Cyber Security Career Opportunities

 

Cyber security roles offer a diverse landscape. You could delve into law enforcement, unravelling key evidence to tackle cyber-related crimes. Or perhaps, craft and implement robust cyber security systems, leveraging cloud technologies to enhance your organisation’s reach and security. Navigate emerging tech to fortify network safety and ensure smooth business operations. Alternatively, be on the frontline against cyber warfare and terrorism. With expertise in hacking countermeasures, incident handling, and forensic probing, you’ll be contributing to larger efforts that bolster both national and global safety.

Start your studies with Expert Guidance!

 

Complete the form below to chat to one of our friendly course advisors.

Entry Requirements

There are two pathways to entry into the Master of Cyber Security.

  • An undergraduate degree from a recognised Australian tertiary institution (or equivalent).
  • Professional attainment and/or work experience.

Applicants without a tertiary qualification are encouraged to begin with the Graduate Certificate in Cyber Security. Upon successful completion of the certificate’s four subjects, students will be granted credit and can transition into the Master of Cyber Security to conclude their studies.

For detailed application procedures, please refer to the ‘How to Apply’ help page.

Fees

Domestic Student

$3890 AUD per subject

International Student

$4124 AUD per subject

More information on Fees can be found on the Fees page. If you want to reduce your cost per course you may be eligible for credit.

Credit

If you’ve acquired some industry certification or completed prior post graduate study, you might be eligible for some academic credit. And here’s some good news – you won’t be charged fees for any subjects you get credit for.

Want a rough idea of the credits you might score from Industry Exams? Just fill out our Credit and Eligibility Form.

We’ll be able to confirm your credit once you’re officially enrolled.

Sample Assessment

Assessments in your subjects will take a variety of forms, all designed to test and enhance your learning. You might be called upon to sit an exam, write a marketing plan, design an application, produce a video presentation, sit a quiz, or do any number of tasks. Why not try a small sample based on the exam from the subject ITE514 – Professional Systems Security?

  1. Because the upkeep of preventive measures is labour intensive
  2. Because it is difficult to implement preventive measures
  3. Because prevention alone is an expensive option
  4. Because even the best preventive measures are subject to failure
Answer: D
  1. The input data exceeds the memory allocated for it.
  2. A buffer overflow is the common result of a SYN flood attack.
  3. Data is formatted differently than expected by the receiving process.
  4. There is insufficient input data to fill the program’s memory buffer.
Answer: A
  1. An unusable address
  2. A broadcast address
  3. A standard IP address
  4. A network address
Answer: B
  1. Impersonating a corporate VP over the phone
  2. Sending an e-mail that persuades a user to open a dangerous attachment
  3. Dumpster diving for sensitive corporate information
  4. Sending a popup window asking the user to re-authenticate
Answer: C
  1. More complex
  2. Connection oriented
  3. Faster
  4. Guaranteed delivery
Answer: C
  1. It broadcast itself to remote hosts with a spoofed address, echoing it to machines all over the Internet.
  2. It mailed itself to the first 50 entries in a victim’s Microsoft Outlook address book.
  3. It invaded root DNS servers, pointing addresses everywhere to infected hosts.
  4. It opened a user’s Internet Explorer browser to a site with the virus.
Answer: B
  1. They are assigned by the local ISP.
  2. They fall into the range 127.0.0.0/8.
  3. They are non-routable on the Internet.
  4. They are often used by services that must contact other services running on the same machine
Answer: A
  1. Semi-public
  2. Public
  3. Private
  4. Intranet
Answer: A
  1. They are difficult for valid users to guess.
  2. Frequently administrators do not know they are there and attackers do.
  3. They are usually hard to obtain.
  4. A default password can never be removed from a system.
Answer: B

Free Short Courses

If you are considering enrolling in one of our unique Master degrees, why not ‘try before you enrol’? Enrolling in these webinar-based free short courses allows insight into how we create a collaborative learning environment, and is also an opportunity to engage with other students and build networks. Passing course exams will earn you a certificate of achievement, and may even qualify you for credit – successfully complete 3 or more short courses and be eligible for 1 industry elective credit.