UNSW Master of Cyber Security
UNSW Master of Cyber Security
Cyber Security
Build your cyber mindset
to secure your future
CRICOS Provider Code 00098G
Defence connections 02
Leaders in Engineering 03
Master of Cyber Security 04
Program overview 06
Knowledge areas 07
Program details 10
Entry requirements 11
Get in touch 14
Course descriptions 15
Global top 50
university
UNSW is ranked 44th
overall in the world.
UNSW Canberra is home to UNSW Canberra Cyber, the largest concentration of research and
tertiary education in the field of cyber security in the Southern Hemisphere. UNSW Canberra Cyber
is a centre of excellence that works closely with the UNSW Defence Research Institute and is a
member of the NSW Defence Innovation Network.
For more than half a century, UNSW Canberra has combined research and education with one of the
world’s top military organisations to develop global leaders.
UNSW Canberra Cyber is a leading centre for cyber learning and research. Its cyber security courses
will teach you to think outside the box. You will obtain the tools and techniques required to detect,
analyse, and confront cyber challenges to help you succeed in this fast-growing industry.
It is about seeing problems and solving them using a mix of lateral thinking, innate curiosity and an
enthusiasm for technology. Above all, engineering is about wanting to make a better and safer world. Our
students and graduates, trained by expert academics are among the best in the world.
We deliver programs across eight schools: Biomedical Engineering, Chemical Engineering, Civil
and Environmental Engineering, Computer Science and Engineering, Electrical Engineering and
Telecommunications, Mechanical and Manufacturing Engineering, Minerals and Energy Resources
Engineering and Photovoltaics and Renewable Energy Engineering.
A powerhouse of innovation in Australia and the region, UNSW Engineering is home to more than 800
researchers and educators, including expertise across 36 research centres and three institutes.
We translate research into real-world solutions, working closely with businesses, government and
community organisations.
The Cyber Security program is designed for ambitious professionals who want to become technical experts or
leaders and leverage lucrative career opportunities within the field of cyber. The skills you develop in this program
will help you provide safe and secure online experiences, often to some of the most vulnerable online users.
Select from either the Management and Leadership specialisation or Security Engineering specialisation within
this program to further develop your expertise and diversify your career options.
This accelerated program is offered 100% online, meaning you can study anywhere at any time and graduate in
only two years without taking time out of the workforce.
1
Agilient, 2019
2
AustCyber, Meeting Demand for Cyber Security Expertise, 2018
3
AustCyber, Sector Competitiveness Plan, 2019
The masters program consists of four foundation courses, seven electives (including at least four specialisation
electives, one additional elective and up to two free electives), plus a project based capstone.
Capstone:
The internet is revolutionising society, enabling new ways to work, live, connect, collaborate and drive
economic growth while also exposing a new world of risk. Develop a security engineering mindset to
synthesise current trends to anticipate the future of cybercrime and gain an understanding of the current
controls that defend against cyber-attacks.
Protect organisations and individuals, their data, and their rights through robust security by
understanding and developing tools, techniques and processes. You will learn how organisations
can handle data in secure ways; understand the emerging issues and principles of privacy and how
to identify, manage and respond to security risks across organisations and current best practice in a
rapidly changing global environment.
Global perspective
The Cyber Security program provides coursework from international and local perspectives. Gain a
contemporary understanding of global cyber security issues and trends from experts and leading
academics to prepare you to anticipate future trends and equip you with the knowledge and skills to deal
with them.
Learn beyond just the technical, to develop a professional, ethical and legal understanding and approach
to the field of cyber. Gain best practice skills to steer organisations through emerging ethical and legal
challenges of the cyber landscape. Recognise and respond to future ethical challenges, develop an
appreciation of professional issues and best practice and understand ways to effectively analyse and
communicate ethical issues related to cyber security.
Understand the current key areas of legislation and how these impact on cyber security professional
practice. Survey the current legal framework in relation to cyber security including hacking, privacy,
surveillance, government powers to intercept data, protection of national infrastructure, use of spectrum,
GPS, military and agencies etc. You will also learn to identify other stakeholders and effectively bring
about positive change by addressing the ramifications of current along with future legislation and
regulation.
In pursuing the Management and Leadership specialisation you will increase your knowledge and understanding
of how business and cyber security intersect. Explore core cyber security concepts and emerging security
engineering principles. Apply your knowledge to design appropriate solutions for real world cryptographic and
security problems.
Gain the necessary skills for leadership in the sustainment and growth of an organisation’s cyber resources,
operations and security. You will also learn to deploy appropriate response and resilience policies to maintain
business in the face of a cyber attack. In your management and leadership capstone, you will apply the theory
and skills learned throughout the program in practical ways, by collaborating in teams to conduct an exploratory
leadership project related to cyber.
Security Engineering
Explore the Security Engineering specialisation, where you will gain detailed security knowledge and
technical capabilities. You will develop both fundamental theoretical knowledge and hands-on skills in the
science and art of security design and assurance including pentration testing and learn to make effective
holistic recommendations for addressing weaknesses and improving security.
Understand paradigms for securing and assuring cloud-based infrastructure at scale and learn to effectively
communicate security recommendation, to key stakeholders. You will also develop your technical coding,
programmatic along with analytical skills and apply security knowledge to real world applications. In your
security engineering capstone unit you will undertake a self-directed learning opportunity and effectively
integrate skills learned across the program, to conduct an exploratory technical project related to cyber.
To help you graduate from one of the world’s leading universities, we’re
here to support you, every step of the way. The design of our online
learning environment seamlessly fits into your busy lifestyle.
Our academics are some of the best in the world, so you can take
confidence in knowing that your online learning experience will have
the same high standard as the on-campus experience.
Throughout your study journey, you’ll be able reach out to your Student
Success Advisor (SSA), who is committed to assisting you at every
stage, from enrolment through to graduation. Your SSA is on hand to
help with all non-academic queries by phone or email.
Go to our Fees page for up-to-date information. Fees are subject to annual review by the University and
may increase annually, with the new fees effective from the start of each calendar year. Indicative fees
are a guide for comparison only based on current conditions and available data. You should not rely on
indicative fees.
Nested qualifications
The Master of Cyber Security program also includes a Graduate Certificate in Cyber Security and a
Graduate Diploma in Cyber Security. For those who do not qualify for direct entry into the masters
program, you may be eligible for entry into the Graduate Certificate. You can articulate from this into
the masters program (upon successful completion of the Graduate Certificate and Graduate Diploma).
Alternatively, if for whatever reason you choose not to continue to complete the masters program, you
can exit with a Graduate Certificate or Graduate Diploma.
His research areas are in Security Engineering and risk, along with
Education and Teaching. He has been teaching successful cyber
security students for two decades. Richard is the UNSW Director of
First Year Experience and has been the Chair of the Academic Board
of the Australian Computer Society Education, a member of the UNSW
Academic Board, and the Chair of the Skills Syllabus Group
of the School of Computer Science and Engineering at UNSW.
Get in touch
Our Student Enrolment Advisors are here to help you with all
your program and enrolment queries.
studyonline.unsw.edu.au
Have a question?
Book a 15-minute chat with Schedule a call
a Student Advisor
Learning activities
Data Security
and Privacy ^
Course overview
This course will empower you to handle data in secure ways, understand the nature and principles of
privacy, and how to securely identify, manage and respond to privacy risks across large datasets and
current best practice in a changing global environment.
Cyber Ethics provides you with fundamental ethical frameworks applied to the field of cyber.
You'll discuss topics from an ethical perspective, enabling you to recognise and respond to
future ethical challenges as they arise.
Principles of Security
Engineering
Course overview
Today, we have the skills and abilities to engineer secure, reliable, physical infrastructure, but we do
not possess the same abilities to build secure digital systems.
This course will introduce you to the principles of the emerging field of Security Engineering, where
you will apply engineering principles and practices to the design, operation and assurance of secure
systems. A systematic, analytic and reflective approach to designing reliable secure systems from
unreliable, insecure components.
Learning activities
Course overview
This course provides students with a theoretical framework and technical skills for securing modern
networks against cyber-attack(s). The course provides you with an overview of modern attacks and
modern defensive measures and tools, including strengths and limitations. The course has a practical
focus and equips you with the applied technical skills needed to design and secure modern networks.
Penetration Testing ^
Course overview
This course provides a theoretical background to the science and art of penetration testing along with an
introduction to hands-on skills used in the process of carrying out a tool-based penetration test. The course
also provides an understanding of the legal requirements, professional ethical and self-care issues, technical
processes, limitations, reporting requirements and communication skills for non-technical audiences.
Cloud Security^
Course overview
This course provides an overview of the rapidly growing field of cloud security. The course addresses the
ways in which cloud paradigms change the strengths and vulnerabilities of infrastructure compared with
traditional computing environments. The course covers paradigms for securing and assuring cloud-based
infrastructure at scale.
Course overview
This course provides a survey of the current legal framework related to cyber security including
hacking, privacy, surveillance, government powers to intercept data, GIPA, FOI, protection of national
infrastructure, copyright, crime, anti-terror legislation, fraud, money laundering, powers of police,
whistle-blowers, use of spectrum, GPS, military, agencies, overseas legal regimes such as GDPR and
corporate compliance requirements.
The course also looks at the main industry players and how they interact with the legislation and
each other. These include ombudsmen, judicial review, privacy commissioners, ministers at state and
federal level, agencies, quasi-governmental bodies such as ASCS, AustCyber and CERTS and the role
of the police, AFP, DSD, Cyber command, 5 eyes, APT and nation states. Finally, we look at worldwide
trends and likely future directions.
Cyber Threats
and Crime^
Course overview
The internet is revolutionising our society by driving economic growth and offering new ways to connect
and co-operate with one another. As with most change, increasing our reliance on cyberspace brings new
opportunities but also new threats. While the internet fosters open markets and open societies, this can also
make users more vulnerable to criminals, activists and foreign intelligence services that want to harm us by
compromising or damaging our critical data and systems.
Activities that fall under this category are often referred to as high tech crime, computer crimes,
or cybercrimes.
This course outlines the current and emerging trends in cybercrime from a holistic perspective and how they
are being countered. It also discusses emerging technologies and how they might be secured and misused.
Course overview
This course provides the skills necessary for leadership in sustainment and growth of an organisation's
cyber resources, operations and security. You will receive an introduction to analysing and developing the
SWOT profile for an organisation or project, prioritising security from a ROI perspective, resilience and
maintaining business continuity whilst maintaining legal obligations.
Course overview
This course helps you develop the skills to manage contemporary risks by gaining a systematic
understanding of the principles and policies for developing the resilience of communities, businesses
and critical systems.
This course will teach you how to program to C and low-level assembly language. It forms an
introduction to programming in C and a low-level understanding of the underlying operation of modern
computers.
C is introduced slowly and at each step we see how C programs are compiled into corresponding
machine code and the details of how the computer actually then executes the program.
This course is suitable even if you have never programmed before or have programmed but are not
familiar with C, or assembly. or would like a refresher through the lens of cyber security.
Operating System
Fundamentals ^
Course overview
This course will take you through the fundamentals of modern operating systems including how they
are attacked, their security mechanisms and countermeasures.
^Pre-requisites: completion of Foundations of Cyber Security and Fundamentals of Coding: C and Assembler
This course follows on from the introductory Penetration Testing course, which is a prerequisite.
Advanced Penetration Testing will teach you offensive security. Course content and coverage is continually
updated to ensure it is industry relevant and includes topics drawn from:
Layer 2 attacks
Social engineering
Stealth
Physical attacks
Insider attacks
Red teaming
Assumed knowledge: Students are expected to be familiar with TCP/IP networking across OSI layers 2–7 and
programming / scripting in python or equivalent.
Reverse Engineering ^^
Course overview
This course covers the principles and art of reverse engineering high-level source code descriptions
of behaviour from compiled and sometimes obfuscated machine code binaries. This is then applied to
vulnerability detection and malware analysis.
Prerequisite: Students are required to have passed the C and Assembler course first.
Course overview
You will develop the skills to forensically analyse digital devices and understand the ethical, legal and
self-care issues associated with cybercrime investigations.
Management and
Leadership Capstone
Project^^
Course overview
This capstone project provides a self-directed learning opportunity, to allow you to apply the skills learned in
this program to an exploratory management or leadership project in cyber security. You will have individual
responsibility for the timely completion of a significant engineering or research project under the guidance
of a member of academic staff. You will be expected to demonstrate a professional level of preparation,
planning, execution, testing and documentation. You will be expected to meet a number of strictly enforced
milestones and to take considerable initiative in overcoming obstacles.
For more information about assessing The Capstone Project, please check here
Security Engineering
Capstone Project^^
Course overview
This capstone project requires pre-approval. Example projects include integrating your learning into a
business or organisation, directed novel research (either individually or in a group), or a researched paper
that benefits the community at large. This course aims to both integrate the skills and knowledge from the
different courses within the degree, and also to provide opportunities to focus on areas that interest you.