Master of Cyber Security

2025 Deakin University Handbook

Year

2026 course information

Award granted Master of Cyber Security
Course Credit Points16
Deakin course codeS734
Course version1
Faculty

Faculty of Science, Engineering and Built Environment

Course Information

For students who commenced from 2017 onwards

CampusOffered at Waurn Ponds (Geelong), Online
Duration

2 years full-time or part-time equivalent. Depending on your professional experience and previous qualifications, you may be eligible for credit which could reduce your course duration.

Course Map - enrolment planning tool

This course map is for new students commencing from Trimester 1 2026

Course maps for commencement in previous years are available on the Course Maps webpage or please contact a Student Adviser in Student Central.

CRICOS code093941G Waurn Ponds (Geelong)
Australian Qualifications Framework (AQF) recognition

The award conferred upon completion is recognised in the Australian Qualifications Framework at Level 9

Course sub-headings

Course overview

In an increasingly digital world, cyberattacks are an everyday occurrence. As a result, cyber security professionals are in high demand globally to protect organisations in all sectors from increasingly sophisticated cyber threats. Deakin’s Master of Cyber Security equips you with the specialised skills to investigate and combat cybercrime, preparing you for a successful career in cyber security anywhere in the world.

Throughout the Master of Cyber Security, you will learn how to detect, analyse and confront cyber security challenges. You will focus on a range of studies and gain knowledge about system security and digital forensics, analytics, organisational security, and human aspects of cyber security. This vital experience prepares you to counter the number one criminal threat to modern-day society.

Ready to take on an expert security role within business, government or law enforcement?

Deakin’s Master of Cyber Security gives you the skills required to effectively and strategically respond to cyber security challenges from both a technical and organisational perspective. You will gain a solid understanding of cyber security concepts and industry practices, as well as the techniques and tools available to prevent and mitigate cyber security threats.

This course focuses on developing skills in programming and software development, information security, penetration testing, threat intelligence and vulnerability assessment.

You will graduate ready for a variety of security roles within business, government and law enforcement. Examples include risk analyst, information security specialist, DevSecOps developer, security operations analyst, cyber security consultant, security systems manager, security consultant, penetration tester, information security auditor or security manager. Combined with experience, you could take on roles such as chief security officer.

Indicative student workload

You can expect to participate in a range of teaching activities each week. This could include lectures, seminars, practicals and online interaction. You can refer to the individual unit details in the course structure for more information. You will also need to study and complete assessment tasks in your own time.

Professional recognition

The Master of Cyber Security is professionally accredited with the Australian Computer Society (ACS) and is recognised for specialist cybersecurity accreditation. This course is also recognised internationally for entry to professional practice by other accrediting bodies through the Seoul Accord.

Career opportunities

The rapid growth of cybercrime has created unparalleled opportunities for those with cyber security expertise. Jobs in database and systems administration, as well as ICT security, are projected to grow by 24.7% by November 2034.* Security management specialists also rank among the top five fastest-growing roles worldwide, with information security analysts appearing in the top 15.^

Cyber security is not just limited to the realm of IT. It exists in the health, science, automotive, and agriculture sectors, among others. Other areas might include government, military, banking, telecommunications, and retail. Wherever digital information is present, there is a need for specialists to combat cybercrime and cyber terrorism. After completing this course, you will have the skills to carve out your niche in an ever-evolving landscape.

Career options are varied, allowing you to work anywhere in the world as a:

  • business continuity or IT security engineer
  • cyber security specialist
  • cyber security manager
  • DevSecOps developer
  • information security auditor
  • infrastructure specialist
  • incident response analyst
  • operations support analyst
  • penetration tester
  • security analyst
  • security architect
  • security consultant
  • security operations centre (SOC) analyst
  • security operations manager
  • security system developer or programmer
  • security system manager.

* 2024 Employment Projections – for the ten years to 2034, Jobs and Skills Australia.
^ World Economic Forum’s ‘The Future of Jobs Report 2025’.

Participation requirements

Elective units may be selected that include compulsory placements, work-based training, community-based learning or collaborative research training arrangements.

Reasonable adjustments to participation and other course requirements will be made for students with a disability. More information available at Disability support services.

Mandatory student checks

Any unit which contains work integrated learning, a community placement or interaction with the community may require a police check, Working with Children Check or other check.

Pathways

Pathways for students to enter the Master of Cyber Security are as follows:

Pathway options will depend on your professional experience and previous qualifications.

Alternative exits

Graduate Certificate of Cyber Security (S535)
Graduate Certificate of Information Technology (S578)
Graduate Diploma of Cyber Security (S635)

Equipment requirements

The learning experiences and assessment activities within this course may require students to have access to a range of technologies beyond a laptop or desktop computer. For information regarding hardware and software requirements, please refer to the Bring your own device (BYOD) guidelines via the School of Information Technology website in addition to the individual unit outlines in the Handbook.

Course Learning Outcomes

Deakin Graduate Learning Outcomes Course Learning Outcomes
Discipline-specific knowledge and capabilities

Develop specialised and essential knowledge of security needs for design and development of secure systems, processes, concepts, and technologies; to develop software systems, products and solutions that automate business processes at par with benchmarks and industry standards and based on evolving cyber security needs.

Develop extended knowledge in the development and use of techniques, systems and approaches for secure communication and the systematic analysis of systems for features related to cyber security.

Communication

Communicate in professional and other contexts to inform, explain and drive sustainable innovation through cyber security and to motivate and effect change by drawing upon advances in technology, future trends and industry standards, and by utilising a range of verbal, graphical and written methods, recognising the needs of diverse audiences including specialist and non-specialist clients, industry personnel and other stakeholders.

Digital literacy

Identify, evaluate, select and use digital technologies, platforms, frameworks, and tools from the field of cyber security to generate, manage, process and share digital resources and justify digital tools selection to influence others.

Critical thinking

Questions assumptions and seeks to uncover inconsistencies and ambiguities in information and judgements, critically evaluates their sources and rationales, to inform and justify decision making in the field of cyber security.

Problem solving

Apply expert, specialised cognitive, technical, and creative skills from cyber security to understand requirements and design, implement, operate, and evaluate solutions to complex real-world and ill-defined computing problems.

Self-management

Apply reflective practice and work independently to apply knowledge and skills in a professional manner to complex situations and ongoing learning in the field of cyber security with adaptability, autonomy, responsibility, and personal and professional accountability for actions as a practitioner and a learner.

Teamwork

Work independently and collaboratively within multidisciplinary environments to achieve team goals, contributing advanced knowledge and skills from cyber security to advance the teams objectives, employing effective teamwork practices and principles to cultivate creative thinking, interpersonal adeptness, leadership skills, and handle challenging discussions, while excelling in diverse professional, social, and cultural scenarios.

Global Citizenship

Engage in professional and ethical behaviour in the field of cyber security, with appreciation for the global context, and openly and respectfully collaborate with diverse communities and cultures.

Course rules

The Master of Cyber Security is structured in four parts:

  • Part A: Foundation Information Technology Studies (4 credit points)
  • Part B: Fundamental Cyber Security Studies (4 credit points)
  • Part C: Mastery Cyber Security Studies (4 credit points)
  • Part D: Cyber Security Capstone Studies (4 credit points).

To complete the Master of Cyber Security, you must pass 8, 12 or 16 credit points. The number of credit points required may vary, depending on your entry point or how much credit you receive as recognition of prior learning (RPL) based on your professional experience and previous qualifications.

A 16-credit point Master of Cyber Security includes:

  • DAI001 Academic Integrity and Respect at Deakin (0-credit-point compulsory unit) in your first study period
  • 15 credit points of core units
  • 1 credit point of course elective units (level 7 SIT or MIS-coded units).

Most units are equal to one credit point. As a full-time student you will study four credit points per trimester and usually undertake two trimesters per year.

Students are required to meet the University's academic progress and conduct requirements.

Course structure

Part A: Foundation Information Technology Studies

DAI001Academic Integrity and Respect at Deakin (0 credit points)

SIT771Object-Oriented Development

SIT772Database Fundamentals

SIT773Software Requirements Analysis and Modelling

SIT774Web Technologies and Development

Part B: Fundamental Cyber Security Studies

SIT736Identity, Access Management and Physical Security

SIT719Analytics for Security and Privacy

SIT763Cyber Security Management

SIT716Computer Networks and Security

Part C: Mastery Cyber Security Studies

SIT735Application and Communication Protocol Security

SIT703Computer Forensics and Investigations

SIT704Ethical Hacking

SIT738Secure Coding

Part D: Cyber Security Capstone Studies

SIT753Professional Practice in Information Technology

SIT764Team Project (A) - Project Management and Practices (capstone)

SIT782Team Project (B) - Execution and Delivery (capstone)

Plus 1 level 7 SIT or MIS-coded open elective unit (1 credit point).

Work experience

You may have an opportunity to undertake a placement as part of your course. For more information, please visit deakin.edu.au/sebe/wil.


Course duration

You may be able to study available units in the optional third trimester to fast-track your degree, however your course duration may be extended if there are delays in meeting course requirements, such as completing a placement.

Fees and charges

Tuition fees will vary depending on the type of fee place you hold, your course, your commencement year, the units you choose to study, your study load and/or unit discipline.

Your tuition fees will increase annually at the start of each calendar year. All fees quoted are in Australian dollars ($AUD) and do not include additional costs such as textbooks, computer equipment or software, other equipment, mandatory checks, travel, consumables and other costs.

For further information regarding tuition fees, other fees and charges, invoice due dates, withdrawal dates, payment methods visit our Current students website.

Estimate your fees

Further information

Contact Student Central for assistance in course planning, choosing the right units and explaining course rules and requirements. Student Central can also provide information for a wide range of services at Deakin. To help you understand the University vocabulary, please refer to our Enrolment codes and terminology page.

Contact Student Central