Bachelor of Science (Cyber Security)
Edith Cowan University
Key Information
Campus location
Joondalup, Australia
Languages
English
Study format
Distance Learning, On-Campus
Duration
6 semesters
Pace
Full time, Part time
Tuition fees
Request info
Application deadline
Request info
Earliest start date
Request info
Introduction
Focuses on the practical and theoretical dimensions of IT security across a range of fundamental areas, such as network security and vulnerability assessment, information security, digital forensics, wireless device security and database security.
Students will gain a solid grounding in conventional computer and network security concepts and skills. In addition, the course is designed to meet the changing landscape of secure computing, which involves not only computers but also telecommunications networks and network-enabled devices such as smartphones and tablet devices.
Admissions
Curriculum
Course Details
Semester availability
- Semester 1: Study full-time at Joondalup or Online
- Semester 1: Study part-time Online
- Semester 2: Study full-time at Joondalup or Online
- Semester 2: Study part-time Online
Course Structure
Year 1 - Semester 1
Unit Code | Unit Title | Credit Points |
SCI1125 | Professional Science Essentials | 15 |
CSP1150 | Programming Principles | 15 |
MAT1252 | Mathematics for Computing | 15 |
CSI1241 | Systems Analysis | 15 |
Year 1 - Semester 2
Unit Code | Unit Title | Credit Points |
CSG1105 | Applied Communications | 15 |
CSI1101 | Computer Security | 15 |
ENS1161 | Computer Fundamentals | 15 |
CSG1207 | Systems and Database Design | 15 |
Year 2 - Semester 1
Unit Code | Unit Title | Credit Points |
CSI2108 | Cryptographic Concepts | 15 |
CSI2104 | Introduction to Information Warfare | 15 |
CSP2101 | Scripting Languages | 15 |
CSI2102 | Information Security | 15 |
Year 2 - Semester 2
Unit Code | Unit Title | Credit Points |
CSI3207 | Network Security Fundamentals | 15 |
CSG2344 | Project Methods and Professionalism | 15 |
CSI2107 | Software Reverse Engineering | 15 |
CSG2305 | Computer Forensics | 15 |
Year 3 - Semester 1
Unit Code | Unit Title | Credit Points |
CSI3208 | Ethical Hacking and Defence | 15 |
MAT3170 | Data Analysis and Visualisation | 15 |
CSG3309 | IT Security Management | 15 |
CSG3308 | Wireless Security | 15 |
Year 3 - Semester 2
Structure 1 - for students who are not undertaking a Work Integrated Learning placement
Unit Code | Unit Title | Credit Points |
CSG3101 ^ | Applied Project | 30 |
Elective Unit | x 2 | 30 |
Structure 2 - for students who are undertaking a Work Integrated Learning placement
Unit Code | Unit Title | Credit Points |
CSI3345 ^ | Work Experience Project | 60 |
^ Core Option
Gallery
Program Outcome
Course Learning Outcomes
- Apply communication skills to demonstrate independence in the design and analysis of cybersecurity solutions and presenting documented results.
- Apply comprehensive knowledge of concepts, principles and techniques in the cybersecurity discipline to both theoretical as well as practical situations.
- Apply creative thinking to identify and solve cybersecurity challenges.
- Demonstrate creativity and initiative to generate ideas for planning and implementing independent projects in the cybersecurity discipline.
- Exercise critical thinking and judgement to investigate and solve problems relating to cybersecurity issues in digital systems and networks.
- Incorporate awareness of cross-cultural issues and demonstrate cultural and indigenous competence in professional practice in the cybersecurity area.
- Use digital technologies and cybersecurity software tools for assessing and evaluating cybersecurity information.
- Work collaboratively in the application of knowledge and skills to identify issues and make decisions relevant to cybersecurity.
Career Opportunities
Career Opportunities
This course prepares students for careers in the field of cybersecurity, including areas such as network security, computer forensics, information warfare and wireless security.
Possible future job titles
Cyber Security Analyst, Cyber Security Officer, Technical IT Security Officer, Network Security Engineer, Digital Forensic Practitioner (Acquisition and Analysis), Information Security Auditor, Information Security Analyst, Security Consultant, Software Auditor, Systems Administrator (Security), Information Security Officer, Penetration Tester.