Online Master of Cybersecurity: Course Structure
Curriculum Details
12–16 subjects required
You can complete La Trobe’s 100 per cent online Master of Cybersecurity course in 2 years with 16 subjects if you choose to study full-time.
You’ll study 12 core essential cybersecurity subjects and select one of the following specialisation streams to the value of 60 credits:
- Project
- Thesis
- Industry based learning
If you have an undergraduate degree in a related field, you may be eligible for credit or Advanced Standing for some of the IT fundamental subjects, which could reduce the course to 12 subjects. If you have an undergraduate degree in an unrelated field, you’ll learn everything you need to know with four IT fundamentals subjects.
For more information about the duration of the program or the course structure, speak with an enrolment adviser on (+61 3) 9917 3009 or request more information now.
Core
Credits
In this subject, students will learn about cyber threats and vulnerabilities, and how different organisations manage these in proportion to the risk that they pose. Students will learn quantitative techniques to assess cyber risks, and apply cost models underlying appropriate technical responses. Students will become familiar with compliance functions and reporting.
In the Internet era, industries and organisations need to be aware of, and be prepared to defend against threats and attacks. Stakeholders should be familiar with the basic principles and best practices of cyber security to better protect their businesses. In this subject, the principles, the state of the art, and strategies for the future of cyber security is explored thoroughly. The topics will focus on information security, ethical and legal practices, mitigating cyber vulnerabilities, and the process of incident response and analysis. The outline of the subject is targeted at ensuring the privacy, reliability, confidentiality and integrity of information systems. Cyber security is a very broad discipline, and therefore, this subject is only intended to cover the basics of the recent state of the art and leading cyber security topics.
In this subject, students will learn how to create and execute frameworks for cyber security governance, based on an understanding of business strategy and risk appetite. Students will become familiar with standards and frameworks commonly used to ensure that business goals can be achieved in a secure way. Students will learn how to identify appropriate roles and responsibilities to support the security function.
This subject starts with an overview of the architecture and management of database systems, and a discussion of different existing database models. The main focus includes relational database analysis, design, and implementation. The students learn: relational algebra as the formal foundation of relational databases; relational conceptual design using an entity-relationship diagram; relational logical database design; security and integrity; and SQL implementation of relational database queries. Students will also learn advanced normalization theory and the techniques to remove data anomalies and redundancies. In this subject, students are required to design a database application that meets the needs of a system requirement specification, and to implement the system using a commercial standard database system such as ORACLE.
In this subject, you will learn computer system organization and its associated topics. It covers the hardware components of the computer, data storage and retrieval, and introduces system software, computer networks, data communications, the Internet, operating systems, file management systems and security. You will also be introduced to information systems and application software packages.
This subject explores the motivations, mindset and techniques used by hackers. Although their activities are illicit and illegal, hackers have a finely attuned understanding of computer networks and systems and how users/customers behave in online environments. If nothing else, they have developed new – albeit illegal and unethical business models that exploit vulnerabilities in computer networks and systems. By looking at systems and practices through the eyes of a hacker, you can better identify weaknesses, emerging threats and develop more effective defences.
In this subject you will be introduced to the steps involved in designing and creating software solutions for a range of practical problems. To enable you to design and implement solutions, you will be introduced to methods for analysis of task definitions, algorithm design, and the writing of program source code. To develop your problem-solving skills, a variety of problems, with increasing complexity, will be presented for your practice. The Python programming language will be used as the program language for implementing software solutions. The strengths of Python, in particular its support of rapid prototyping of ideas, will be exploited to facilitate the development of your problem-solving skills and effective software development practice.
In this subject we introduce the architecture, structure, functions, components, and models of the Internet and other computer networks. We also look at OSI and TCP/IP layer models to examine the nature and roles of protocols and services at the application, network, data link, and physical layers. The fundamentals of IP addressing, and basic concepts of Ethernet will also be studied.
This subject introduces students to the procedures related to computer forensics and digital investigations including formal case management and evidential best practices. The subject will start with an overview of operating system architectures, data structures and file systems. Students will explore the key principles associated with digital forensic processes, data hiding, evidence collection and validation required to perform forensic analysis. The subject will also cover how to conduct technical forensic processes that comply with legal requirements and documentation for forensic evidence, and the use of practical forensic tools.
Penetration testing involves assessment of organisational vulnerabilities through the design and execution of technical system tests. This subject introduces students to the principles and processes involved in system penetration testing. It examines common software tools used in a penetration testing exercise. Students will learn various types of penetration testing and their phases, and the interpretation of results from commonly used penetration testing tools. Students will learn of the value of penetration testing for businesses and organisations, and how to use testing results to report on, and to improve, an organisation’s security resilience.
The purpose of this subject is to outline the basic principles of Entrepreneurship. It will examine the steps required in developing an idea into a business and will explore the tools and necessary insights to make a successful venture. The subject will involve theory, case studies and guest speakers on start-up issues, pitfalls, and ingredients for success. Students will also develop professional skills related to ethical and moral decision making and evaluate the social implications of their work and the broader global context. The subject requires active participation in group discussions and activities.
This subject provides necessary skills and techniques to manage large-scale information technology projects, with strong focus on the analytical side of project management, referring to scheduling, cost, and resource management, as well as the ‘people’ and client management issues that must be dealt with in order to ensure successful projects. Students learn to design Information Technology projects covering network management or software development or data science for efficiency, portability and re-use, as well as to take advantage of different standards and system utilities, data and information management techniques.
Request more information
Our enrolment team is here to support you and answer your questions about the application process, entry requirements, tuition fees and study assist options or specific course details.
Complete the form below for detailed course information and to be contacted by phone and email.
All fields required