MJRU-CYBSE v.1 Cyber Security Major (B Comp)
Major/Stream Overview
This major/stream is part of a larger course. Information is specific to the major/stream, please refer to the course for more information.
This major provides coverage of the key concepts and challenges in data and resource protection and computer software security. There is a focus on both the high level (e.g. cryptography theory and data access policy development and security program management) and low level practical (e.g. computer forensics, network intrusion detection and incident handling) aspects of computer security. The addition of programming techniques differentiates this major from more policy-based options.
Course Accreditation Status
Will request provisional accreditation from ACS on approval.
Career Opportunities
Graduates may be employed in one of a number of roles relating to computer or network security on either the red (penetration testing) or blue (target defense) teams. In addition they can join programming teams as security specialists and have good knowledge of security policy.
Additional Course Expenses
Students may be expected to purchase a number of textbooks and other essential study materials.
Major/Stream Entry and Completion Details
ATAR MATH METHODS
Credit for Recognised Learning
Applications for credit towards a course are assessed on an individual basis. Credit reduces the amount of learning required to complete the course and may be granted for formal education qualifications, non-formal learning from non-award programs of study and informal learning through work experiences. Further information can be found at http://futurestudents.curtin.edu.au/non-school-leavers/rpl.cfm
Major/Minor/Stream Organisation
Major/Stream Learning Outcomes
A graduate of this course can:
1. implement processes based on best practice when designing and implementing software
2. evaluate standard algorithms, techniques, and technologies relating to cyber security in a manner that is appropriate for a given problem and think critically and creatively to generate innovative and optimum theoretical and practical solutions
3. identify, evaluate and synthesise information from a range of computing sources to optimise the process of software design and implementation
4. document software and security activities and artefacts and communicate them in written and oral form to both technical and non-technical audiences and communicate effectively in ways appropriate to the audience and purpose
5. effectively use new and existing technologies, especially those relating to cyber security, recognising their advantages and limitations
6. sustain intellectual curiosity by updating their knowledge, engage in continuous training and research, and take control of their own learning and development
7. recognise and apply IEEE/ACM/ACS standards in the process of software design and development as well as the ACSC and ISO27000 series standards for cyber security
8. contribute to society using technology in a secure, ethical, legal, and socially responsible manner
9. demonstrate initiative, leadership and ethical practice when working independently and collaboratively
Duration and Availability
3 YEARS
| Course Structure | Hrs/Wk | Credit | |||
|---|---|---|---|---|---|
| Year 2 Semester 1 | |||||
| CMPE2000 | v.1 | Data Communications and Network Management | 5.0 | 25.0 | |
| CNCO3001 | v.1 | Network Systems Design | 3.0 | 25.0 | |
| COMP2006 | v.1 | Operating Systems | 3.0 | 25.0 | |
| COMP2002 | v.1 | Unix Systems Programming | 4.0 | 25.0 | |
| 100.0 | |||||
| Year 2 Semester 2 | |||||
| COMP2005 | v.1 | Computing Topics | 3.0 | 25.0 | |
| ISEC3004 | v.1 | Cyber Crime and Security Enhanced Programming | 3.0 | 25.0 | |
| ISYS1001 | v.1 | Database Systems | 4.0 | 25.0 | |
| SELECT ELECTIVE UNITS TO THE TOTAL VALUE OF: | 25.0 | ||||
| 100.0 | |||||
| Year 3 Semester 1 | |||||
| ISEC2000 | v.1 | Fundamental Concepts of Cryptography | 3.0 | 25.0 | |
| COMP3010 | v.1 | Machine Learning | 3.0 | 25.0 | |
| ISEC3006 | v.1 | Cyber Security Capstone Project 1 | 1.0 | 25.0 | |
| OR | |||||
| ISAD3000 | v.2 | Capstone Computing Project 1 | 1.0 | 25.0 | |
| SELECT ELECTIVE UNITS TO THE TOTAL VALUE OF: | 25.0 | ||||
| 100.0 | |||||
| Year 3 Semester 2 | |||||
| ISEC3005 | v.1 | Cyber Security- Intrusion Detection System and Incident Handling | 3.0 | 25.0 | |
| ISEC3002 | v.2 | Penetration Testing and Defence | 4.0 | 25.0 | |
| ISEC3007 | v.1 | Cyber Security Capstone Project 2 | 1.0 | 25.0 | |
| OR | |||||
| ISAD3001 | v.2 | Capstone Computing Project 2 | 1.0 | 25.0 | |
| SELECT ELECTIVE UNITS TO THE TOTAL VALUE OF: | 25.0 | ||||
| 100.0 | |||||
Further Information
If you need more course information, you may contact the relevant areas: For Current Students: Student Services Office, please click here for further details: http://students.curtin.edu.au/contact_offices.cfm. For Domestic Future Students: Curtin Connect Future Students, enquiries: https://future.connect.curtin.edu.au/ , Tel: +61-1300 222 888. For International Future Students: Curtin International, email: international@curtin.edu.au, Tel: +61-8-9266 7331.
Course Structure Disclaimer
Curtin University reserves the right to alter the internal composition of any course to ensure learning outcomes retain maximum relevance. Any changes to the internal composition of a course will protect the right of students to complete the course within a normal timeframe and will not result in additional cost to students through a requirement to undertake additional units.
Disclaimer
Information in this publication is correct at the time of printing but may be subject to change.
In particular, the University reserves the right to change the content and/or method of assessment, to change or alter tuition fees of any unit of study, to withdraw any unit of study or program which it offers, to impose limitations on enrolment in any unit or program, and/ or to vary arrangements for any program.
This material does not purport to constitute legal or professional advice.
Curtin accepts no responsibility for and makes no representations, whether express or implied, as to the accuracy or reliability in any respect of any material in this publication.
Except to the extent mandated otherwise by legislation, Curtin University does not accept responsibility for the consequences of any reliance which may be placed on this material by any person.
Curtin will not be liable to you or to any other person for any loss or damage (including direct, consequential or economic loss or damage) however caused and whether by negligence or otherwise which may result directly or indirectly from the use of this publication.
International students
International students studying in Australia on a student visa can only study full-time and there are also specific entry requirements that must be met. As some information contained in this publication may not be applicable to international students, refer to international.curtin.edu.au for further information. Australian citizens, permanent residents and international students studying outside Australia may have the choice of full-time, part-time and external study, depending on course availability and in-country requirements.