Graduate Diploma of Cyber Security
Our cyber security course has a flexible mode of delivery and will develop the networking and security theory and skills you need to secure corporate networks against threats. Every business has a network presence, which exposes it to both deliberate and inadvertent attacks. You will be equipped to address these critical business needs in network security.
You will gain hands-on experience taught by industry certified professionals using state-of-the-art equipment. The degree includes courseware by (ISC)2 and the Cisco Academy and can additionally lead to industry qualifications.
This course is designed for students who hold a Bachelor degree in any discipline. The first year includes topics in general security using the (ISC)2 SSCP Common Body of Knowledge, and in fundamental networking using the Cisco Academy CCNA program. System and application security and hardening are also covered.
You will gain the knowledge and skills required for professional certification in advanced professional practice (note that separate processes and, in some cases, tests and professional experience requirements apply). This includes Cisco certification as a Cisco Certified Network Associate (CCNA) and CCNA Security. Graduates with suitable work experience may also seek (ISC)2 certification as Systems Security Certified Practitioner (SSCP).
|Study Level||Graduate Diploma|
FT: 1 year (or PT equivalent)
|Course Type||Graduate Diploma|
|Campuses||Box Hill, City|
|Tuition Fee Type||Estimated Annual Fee|
|Full Tuition Fee||$15,096.00|
|Service Fees||Estimated Annual Fees|
|Service & Amenities*||$155.00|
|Core Skills Support**||$75.00|
|Annual Material Fees||No materials fee applies|
|Retain Course Items***||No fee applies|
* Does not apply to VETiS or Short course students.
** Does not apply to VETiS, International students, Short Courses, Graduate Degrees , or re-enrolling students who re-enrol in the same course.
***Retained Course Items are purchased by the student once prior to commencing. The course items bought by the student become the property of the student. Such items retain a generic application for other purposes outside the student's course of study (e.g. textbooks).
Annual student tuition & material fees as published are subject to change given individual circumstances at enrolment. Fees listed are for 2019 and may increase annually over the duration of delivery. Advertised start dates and delivery locations are subject to viable student numbers. For more information please contact our Course Advisors on 1300 BOX HILL.
February and July
Full time: 1 year or part time equivalent
You must have successfully completed an undergraduate degree in any discipline.
You may be eligible to progress into the second year of the Master of Network Security degree.
This course is accredited by the Tertiary Education Quality and Standards Agency (TEQSA) and the qualification is aligned with the Australian Qualification Framework (AQF) level 8 and Box Hill Institute Graduate Attributes.
- Lifelong Learning
- Global Citizenship
- Information Literacy
- Application & Inquiry
- Ethical, Social & Professional Understanding
- Personal & Intellectual Autonomy
Graduates will find employment in key senior roles such as:
- ICT security manager
- ICT audit manager
- network security engineer
- network engineer
- security analyst
- security consultant
- security engineer
- security assurance manager
- security specialist
- security and risk analyst.
You will complete 8 core subjects.
|ICT804||SECURE SYSTEM MANAGEMENT||6.0|
In this subject, students gain knowledge and skills that will allow them to address the technical and administrative challenges involved in centrally controlling a multi-user network. Students gain in-depth knowledge of the structure and function of a multi-user operating system, and they gain professional skills in operating system installation, configuration, administration, and maintenance. Students gain skills in access control, including managing accounts and resources.
The subject emphasises the relationship between system management and security. This includes coverage of effective mitigation strategies such least privilege, application and operating system patches, and password/ passphrase management. The subject also covers business continuity issues, auditing, and reporting.
|ICT802||OVERVIEW OF SECURITY||6.0|
This subject provides students with a comprehensive overview of information and business security. Students gain knowledge and skills to understand, apply, evaluate, and manage information and business security. Students gain an understanding of how a security program needs to support the organisation’s goals and objectives. Students also gain the ability to analyse, evaluate and manage an organisation’s security program.
The subject provides an overview of six of the key domains of security as recognised by the (ISC)2 SSCP CBK: Access Controls, Cryptography, Security Operations and Administration, Monitoring and Analysis, Risk Response and Recovery and Malicious Code and Activity. The seventh domain (Networks and Communications) is covered in ICT806 Overview of Network Security. These domains provide a framework for the discussion, analysis, evaluation, and management of information and business security.
The subject emphasises effective mitigation strategies for cyber intrusions in the present ICT environment, as identified by the Australian Defence Signals Directorate and Australian Government Protective Security Policy amongst others.
|ICT803||OVERVIEW OF NETWORKING AND ROUTING||6.0|
This subject provides students with a solid basis in networking and routing having particular regard to network security. Students gain the knowledge and skills to analyse, design, specify, configure, and manage a medium sized network. The unit provides an overview of internetworking topologies and technologies. This involves an examination of networking from the OSI (Open Systems Interconnection) seven-layer model and TCP/IP perspectives. Students will gain knowledge in the function and operation of appropriate equipment from each layer. The subject provides an introduction to router security. The key practical assessment task involves the successful analysis, design, specification, configuration, and management of a medium sized network.
|ICT806||OVERVIEW OF NETWORK SECURITY||6.0|
This subject focuses on the processes and technologies required to secure a network. Current issues and emerging trends and technologies are examined. The subject includes security policy design and management; firewalls and secure routers; AAA (authentication, authorisation, and accounting) in a networked environment; intrusion prevention systems; and an overview of virtual private networks (VPN).
The subject begins with an overview of the security vulnerabilities, threats and attacks that are found in computer networks. This includes an overview of the security vulnerabilities found in networked industrial control systems, such as SCADA (Supervisory Control and Data Acquisition). The remainder of the subject concentrates on various technical methodologies and management policies designed to protect networked systems. The emphasis is on higher level activities such as policy decisions, and network design and configuration. The subject also provides an overview of effective mitigation strategies for network attacks, including filtering, whitelisting and network segmentation. Students gain skills in advanced techniques in network security and consolidate these with laboratory and assignment work.
|ICT807||SWITCHING PRINCIPLES AND WAN TECHNOLOGIES||6.0|
This subject covers the principles of switching and wide area network technologies. The students gain skills in the analysis, design, configuration, and management of switched networks, including Local Area Networks (LAN) and VLANs (Virtual Local Area Networks). Students also gain knowledge and skills in scaling IP addresses, wide area network (WAN) technologies, and key network protocols, such as the Spanning Tree Protocol (STP), the Interior Gateway Routing Protocol (IGRP), and the Enhanced Interior Gateway Routing Protocol (EIGRP). Student assessment includes the analysis, design, configuration, and management of a switched network.
|ICT801||NETWORK SECURITY PROFESSIONAL PRACTICE||6.0|
This subject introduces students to key areas of professional practice, professionalism and professional communication associated with network security. The subject covers professional certification, autonomy, reflection, responsibility and accountability. Students will be introduced to research and industry literature as well as research principles which are also key aspects of lifelong professional development. Students gain knowledge and skills in communication and collaboration that will help them to work effectively as network security professionals. These include oral and written communication, research report writing, teamwork, group dynamics, and conflict resolution.
The subject provides students with an overview of the context of network security in Australia and worldwide, including organisational and social issues. The subject addresses specific issues that are particularly relevant to ICT professionals in network security, such as legal and ethical issues, social issues, and privacy.
Through critical engagement with literature, case studies and problem solving, students lay the foundation of professional principles which will inform their practice in a rapidly changing, high risk work context.
This subject provides students with the knowledge and skills to effectively manage IT projects. This encompasses common and emerging concepts, theories, processes, and techniques that are essential to managing IT projects. The subject will help students to understand, analyse, and evaluate the common issues that project team members and stakeholders face, and to design and manage ways to address these issues. The subject covers the key knowledge areas from project management frameworks and methodologies, including the project lifecycle, project selection, project planning, managing project resources, costs, duration, and quality, leadership, risk management and change management. Students gain knowledge in how project characteristics and management differ in the context of outsourcing, off-shoring and international project teams. Group and individual projects are used to assess levels of achievement.
|ICT808||SECURE SYSTEM PROGRAMMING||6.0|
This subject introduces scripting languages used for system administration, networking, and security applications. There is an emphasis on the Perl programming language. The subject provides an overview of the scripting language paradigm, along with abstraction, problem solving, and understanding requirements. The subject focuses on applications of scripting language programming. This includes automating system administration; SQL database administration; SNMP; LDAP; log files; network monitoring; and other security applications. There is also coverage of security concerns with scripting languages, including buffer overflow; SQL injection; and command injection.