UNSW Master of Cyber Security
UNSW Master of Cyber Security
Cyber Security
                                   Build your cyber mindset
                                       to secure your future
CRICOS Provider Code 00098G
Defence connections 4
Leaders in Engineering 5
Program overview 8
Knowledge areas 11
Program details 14
Entry requirements 15
Academic leadership 17
Get in touch 18
Course descriptions 19
                                         2
Learn at UNSW
– a world leader.
  Most employable                            Top ranked for Engineering
  students                                   and Technology
  UNSW has been voted as having              UNSW is ranked 1st in Australia for
  the most employable students at            Engineering and Technology studies.
  the AFR Top 100 Future Leaders             QS World University Rankings by Subject, 2024
  Awards, 2020, 2021, 2022, 2023
  and 2024.
Top 20 worldwide
                                                                                             3
Defence
connections
This program has been developed in collaboration with industry experts from UNSW
Canberra at the Australian Defence Force Academy (ADFA). UNSW Canberra is the only
national academic institution with an integrated defence focus.
UNSW Canberra in home to the UNSW Institute for Cyber Security (IFCYBER), the largest
concentration of research and tertiary education in the field of cyber security in the
Southern Hemisphere. UNSW Canberra Cyber is a centre of excellence that works closely
with the UNSW Defence Research Institute and is a member of the NSW Defence Innovation
Network.
For more than half a century, UNSW Canberra has combined research and education with
one of the world’s top military organisations to develop global leaders.
UNSW Canberra Cyber is a leading centre for cyber learning and research. Its cyber security
courses will teach you to think outside the box. You will obtain the tools and techniques
required to detect, analyse, and confront cyber challenges to help you succeed in this fast-
growing industry.
                                                                                               4
Leaders in
Engineering
UNSW Engineering is Australia’s leading engineering faculty, ranking #1 in Australia for
Engineering and Technology studies*. Our innovative teaching and practical work integrated
learning shapes the future leaders of engineering.
It is about seeing problems and solving them using a mix of lateral thinking, innate curiosity
and an enthusiasm for technology. Above all, engineering is about wanting to make a better
and safer world. Our students and graduates, trained by expert academics are among the
best in the world.
A powerhouse of innovation in Australia and the region, UNSW Engineering is home to more
than 800 researchers and educators, including expertise across 36 research centres and
three institutes.
                                                                                                 5
Master of
Cyber Security
Cybercrime is a rapidly escalating issue in Australia, with the     Designed for industry
Australian Cyber Security Centre reporting a 13% rise in cyber      needs
incidents in 2023 alone(ACS). This increase underscores the
urgent need for cybersecurity professionals, as both businesses     Designed by leading cyber security
and governments face increasingly advanced cyberattacks.            academics and industry experts
The economic impact is significant, with cybercrime costing         and built to remain relevant in a
Australia an estimated $33 billion annually, threatening critical   continuously developing sector.
infrastructure and sensitive data(ACS).
                                                                    Tailored security
At the same time, Australia is experiencing a major shortage
                                                                    specialisations
of cybersecurity talent. With only one specialist for every 240
companies, this shortfall poses significant risks to businesses.    Select from two cyber security
Moreover, the gap is expected to grow, with an estimated            specialisations and a range of
shortage of 30,000 professionals in the near future(ACS)          specific electives to build the
(Australian Associated Press). This highlights the importance       masters program that suits your
of investing in advanced education, such as a Master of Cyber       career path, existing skill set and
Security, to address this critical workforce gap.                   aspirations.
The Cyber Security program is designed for ambitious
professionals who want to become technical experts or leaders       Quality and reputation
and leverage lucrative career opportunities within the field
                                                                    Learn cyber security from one of
of cyber. The skills you develop in this program will help you
                                                                    the most highly regarded Australian
provide safe and secure online experiences, often to some
                                                                    universities and join our hugely
of the most vulnerable online users. Select from either the
                                                                    successful and diverse cyber
Security Management and Leadership specialisation or Security
                                                                    security alumni community.
Engineering specialisation within this program to further develop
your expertise and diversify your career options.
                                                                    Accelerated learning with
This accelerated program is offered 100% online, meaning you        immediate ROI
can study anywhere at any time and graduate in only two years
without taking time out of the workforce.                           With intakes every two months, study
                                                                    one course at a time, 100% online
                                                                    and accelerated, instantly adding
                                                                    value to your career and organisation
                                                                                                            6
Masters
program
specialisations
                                                                                            7
Program
overview
The Master of Cyber Security program encompasses 12 online courses, with the choice of
selecting from a Security Management and Leadership or Security Engineering specialisation.
The masters program consists of four core courses, including at least four specialisation
courses, up to three electives, plus a project based capstone. Students may take one non-
domain elective with the permission of the Program Convenor.
                                                                                Elective Courses
                                                                                Students may take up to 2:
                                                                                ß   Cyber Operations
                                                                                ß   Cyber Risk and Resilience
                                                                                ß   Cyber Management and Governance
                                                                                ß   Cyber Threats and Crime
                                                                                ß   Reverse Engineering
                                                                                ß   Cyber and the Law
                                                                                ß   Non-Domain Elective
                                                                                    With the permission of the Program Convenor, students may
                                                                                    substitute up to 6 UOC elective with any other postgraduate
                                                                                    course offered in one of the UNSW Online Programs.
                                                                                Elective Courses
Core Courses – complete all
                                                                                Students can take a maximum of 2 courses:
ß Data Security and Privacy
                                                                                ß   Digital Forensics†
ß Cyber Security and Ethics
                                                                                ß   Advanced Penetration Testing^
ß Principles of Security Engineering
                                                                                ß   Penetration Testing
                                                                                ß   Cloud Security
+ Specialisation                                                                ß   Reverse Engineering†
                                                                                ß   Fundamentals of Coding: C and Assembler
Choose 1 of the 2 specialisations                                               ß   Operating System Fundamentals for Security#
and their courses from the right.                                               ß   Non-Domain Elective
                                                                                    With the permission of the Program Convenor, students may
                                                                                    substitute up to 6 UOC elective with any other postgraduate
                                                                                    course offered in one of the UNSW Online Programs.
                                                                                Electives Courses
                                                                                Student can take a maximum of 2 courses:
                                                                                ß   Cyber Operations
                                                                                ß   Cyber Risk and Resilience
                                                                                ß   Cyber Management and Governance
                                                                                ß   Cyber Threats and Crime
                                                                                ß   Reverse Engineering
                                                                                ß   Cyber and the Law
                                                                                ß   Non-Domain Elective
                                                                                    With the permission of the Program Convenor, students may
                                                                                    substitute up to 6 UOC elective with any other postgraduate
                                                                                    course offered in one of the UNSW Online Programs.
+ Elective Course
Choose 1 from the list to the right
                                       Have a question?
                                       Book a 15-minute chat with              Schedule a call
                                       a Student Advisor
Knowledge areas
Identify, mitigate and defend against risks and attacks
The internet is revolutionising society, enabling new ways to work, live, connect, collaborate and drive
economic growth while also exposing a new world of risk. Develop a security engineering mindset to
synthesise current trends to anticipate the future of cybercrime and gain an understanding of the current
controls that defend against cyber-attacks.
Protect organisations and individuals, their data, and their rights through robust security by
understanding and developing tools, techniques and processes. You will learn how organisations can
handle data in secure ways; understand the emerging issues and principles of privacy and how to
identify, manage and respond to security risks across organisations and current best practice in a rapidly
changing global environment.
Global perspective
The Cyber Security program provides coursework from international and local perspectives. Gain a
contemporary understanding of global cyber security issues and trends from experts and leading
academics to prepare you to anticipate future trends and equip you with the knowledge and skills to deal
with them.
Understand the current key areas of legislation and how these impact on cyber security professional
practice. Survey the current legal framework in relation to cyber security including hacking, privacy,
surveillance, government powers to intercept data, protection of national infrastructure, use of spectrum,
GPS, military and agencies etc. You will also learn to identify other stakeholders and effectively bring
about positive change by addressing the ramifications of current along with future legislation and
regulation.
                                                                                                             11
Security Management and Leadership
In pursuing the Security Management and Leadership specialisation you will increase your knowledge
and understanding of how business and cyber security intersect. Explore core cyber security concepts
and emerging security engineering principles. Apply your knowledge to help lead and manage
organisations through real world cyber security problems.
Gain the necessary skills for leadership in the sustainment and growth of an organisation’s cyber
resources, operations and security. You will also learn to deploy appropriate response and resilience
policies to maintain business in the face of a cyber attack. In your management and leadership capstone,
you will apply the theory and skills learned throughout the program in practical ways, by collaborating in
teams to conduct an exploratory leadership project related to cyber.
Security Engineering
Explore the Security Engineering specialisation, where you will gain detailed security knowledge and technical
capabilities. You will develop both fundamental theoretical knowledge and hands-on skills in the science and art of
security design and assurance including pentration testing and learn to make effective holistic recommendations
for addressing weaknesses and improving security.
Understand paradigms for securing and assuring cloud-based infrastructure at scale and learn to
effectively communicate security recommendation, to key stakeholders. You will also develop your
technical coding, programmatic along with analytical skills and apply security knowledge to real world
applications. In your security engineering capstone unit you will undertake a self-directed learning
opportunity and effectively integrate skills learned across the program, to conduct an exploratory
technical project related to cyber.
                                                                                                                      12
The UNSW
Online experience
z We are here to support you, every step of the way, to graduate from one of the
  world’s leading universities. Our online learning environment has been designed
  to seamlessly fit into your already busy schedule and you’ll be able to access
  course resources on any device, at any time.
z Our academics are some of the best in the world and, even though you’re studying
  online, you can expect your learning experience to be the same high standard as
  that of our on-campus students.
z Throughout your study journey, you will be able to turn to your Student Success
  Advisor, who is committed to assisting you from enrolment through to graduation.
  They are on-hand for all non-academic queries by phone or email.
z You will also have access to Career Success – a curated, self-paced module
  that provides a framework for thinking about, and taking action to implement, an
  effective career plan. You will also have access to Career Success – a curated,
  self-pawced module that provides a framework for thinking about, and taking
  action to implement, an effective career plan. Through Career Success, you will
  have access to tools like Career AI (powered by VMock) and CaseCoach, and
  guides on crafting the perfect LinkedIn profile, resume, and cover letter.
                                                                                     13
Program details
   2024 Indicative domestic program fees^
 Master of Cyber Security                               Program code: 8649                    12 courses              $58,000
^All prices are listed in Australian dollars and may exceed the indicative figures listed. Visit our Fees page for up-to-date information
inclusive of 2024 indicative International program fees. Fees are subject to annual review by the University and may increase annually,
with the new fees effective from the start of each calendar year. Indicative fees are a guide for comparison only based on current
conditions and available data. You should not rely on indicative fees.
Nested qualifications
   The Master of Cyber Security program also includes a Graduate Certificate in Cyber Security and a
   Graduate Diploma in Cyber Security. For those who do not qualify for direct entry into the masters
   program, you may be eligible for entry into the Graduate Certificate. You can articulate from this into
   the masters program (upon successful completion of the Graduate Certificate and Graduate Diploma).
   Alternatively, if for whatever reason you choose not to continue to complete the masters program, you
   can exit with a Graduate Certificate or Graduate Diploma.
     Study plans and completion times might vary depending on elective choice, recognition of prior learning (RPL), leave and subject
     availability. For more information, speak with a Student Advisor.
                                                                                                                                            14
Entry requirements
UNSW’s Postgraduate Coursework Entry Score Calculator
To assist us in assessing your previous study and eligibility for this course, we recommend using the
UNSW Postgraduate Coursework Entry Score Calculator as a guide. This calculator converts and scales the
grading schemes across the world into a percentage that applies to UNSW entry requirements.
   1. Have completed the Graduate        1. Have completed the Graduate            1. Have completed a Bachelor
      Certificate in Cyber Security         Certificate in Cyber Security (or         degree or higher level
      (or equivalent) with a                equivalent) with a minimum                qualification (or equivalent);
      minimum WAM of 65;                    WAM of 65;
                                                                                      OR
      OR                                    OR
                                                                                   2. Applicants who have not
   2. Have completed the Graduate        2. Have completed a Bachelor                 completed a Bachelor degree
      Diploma in Cyber Security (or         degree or higher level                    or higher level qualification are
      equivalent);                          qualification in a cognate                required to have a minimum of
                                            discipline to the selected                2 years relevant or professional
      OR                                    specialisation* with a minimum            experience* in cyber security or
   3. Have completed a Bachelor             WAM of 65.                                other cyber-related positions.
      degree or higher level
      qualification in a cognate
      discipline to the selected
      specialisation* with a
      minimum WAM of 65.
   *ZZENDS Security Management           *ZZENAS Security Management &             *Relevant experience includes being
   & Leadership cognate disciplines      Leadership cognate disciplines may        responsible for tasks within cyber-
   may include Science, Engineering,     include Science, Engineering, Business,   related role that may include technical
   Business, Leadership, and Policy.     Leadership, and Policy.                   or governance roles. It can include
                                                                                   experience of managing a small team,
                                                                                   being a team leader, managing a
   *ZZENES Security Engineering          *ZZENBS Security Engineering cognate
                                                                                   relevant project.
   cognate disciplines may include       disciplines may include Science,
   Science, Engineering, and other       Engineering, and other degrees with
   degrees with substantial computing,   substantial computing, mathematics,
   mathematics, and/or statistics        and/or statistics courses.
   courses
                                                                                                                             15
English Language
You may need to provide evidence of your English
language proficiency to study at UNSW, depending
on your educational background and citizenship.
UNSW requires a minimum level of English language
competency for enrolment. English language skills
are essential for webinar comprehension and
the completion of coursework, assignments and
examinations. If English is not your first language,
you will need to provide proof of your English
proficiency prior to receiving an offer to study at
UNSW. You can do this by providing evidence that
you meet one or more of the following criteria:
Other qualifications
English waivers
                                                             16
Academic leadership
Dr Rahat Masood, Program Director
In 2022, Tom made the transition into full-time academia, focused on teaching
in this Master of Cyber Security program and professional development
courses. He is also involved in an eclectic range of research encompassing
Design Science, Serious Games, Modelling, and Machine Learning. Tom is
passionate about giving students an authentic experience that leans on his
eclectic professional experience and a keen interest in teaching and learning.
                                                                                 17
Get in touch
Our Student Enrolment Advisors are
here to help you with all your program
and enrolment queries.
studyonline.unsw.edu.au
future-student@studyonline.unsw.edu.au
Have a question?
Book a 15-minute chat with a Student Advisor
Book now
Apply now
                                                          18
Course
descriptions
Data Security and Privacy                      19
Cybersecurity Ethics 19
Cyber Operations 20
Penetration Testing 20
Cloud Security 20
Reverse Engineering^ 24
Digital Forensics^^ 24
                                                     19
Data Security and Privacy
Course overview
Security and privacy are related but distinct concepts; they are also some of the defining
terms of the 21st century. This course equips student for handling data in secure ways,
understanding the nature and principles of privacy, and how to securely identify manage and
respond to privacy risks across large datasets and current best practice in a changing global
environment.
Cybersecurity Ethics
Course overview
Ethical and professional behaviour are the cornerstone of cyber security. This course
provides students with fundamental ethical frameworks, applied to the cyber security
profession. Students analyse topics and current and historic cyber events from
ethical, professional, and legal perspectives. The course equips students to recognise,
effectively analyse, and respond to future ethical challenges as they arise.
Principles of Security
Engineering
Course overview
Today, we have the skills and abilities to engineer secure, reliable, physical infrastructure, but
we do not possess the same abilities to build secure digital systems.
This course will introduce you to the principles of the emerging field of Security Engineering,
where you will apply engineering principles and practices to the design, operation and
assurance of secure systems. A systematic, analytic and reflective approach to designing
reliable secure systems from unreliable, insecure components.
                                                                                                     20
Cyber Operations
Course overview
This course provides students with a theoretical framework and technical skills for securing
modern networks against cyber-attack(s). The course provides you with an overview of modern
attacks and modern defensive measures and tools, including strengths and limitations. The
course has a practical focus and equips you with the applied technical skills needed to design
and secure modern networks.
Penetration Testing
Course overview
This course provides a theoretical background to the science and art of penetration testing along
with an introduction to hands-on skills used in the process of carrying out a tool-based penetration
test. The course also provides an understanding of the legal requirements, professional ethical and
self-care issues, technical processes, limitations, reporting requirements and communication skills
for non-technical audiences.
Cloud Security
Course overview
This course provides an overview of the rapidly growing field of cloud security. The course
addresses the ways in which cloud paradigms change the strengths and vulnerabilities of
infrastructure compared with traditional computing environments. The course covers paradigms for
securing and assuring cloud-based infrastructure at scale.
                                                                                                       21
Cyber and the Law
Course overview
This course provides a survey of the current legal framework related to cyber security including hacking,
privacy, surveillance, government powers to intercept data, GIPA, FOI, protection of national infrastructure,
copyright, crime, anti-terror legislation, fraud, money laundering, powers of police, whistle-blowers, use
of spectrum, GPS, military, agencies, overseas legal regimes such as GDPR and corporate compliance
requirements.
The course also looks at the main industry players and how they interact with the legislation and each
other. These include ombudsmen, judicial review, privacy commissioners, ministers at state and federal
level, agencies, quasi-governmental bodies such as ASCS, AustCyber and CERTS and the role of the
police, AFP, DSD, Cyber command, 5 eyes, APT and nation states. Finally, we look at worldwide trends and
likely future directions.
Activities that fall under this category are often referred to as high tech crime, computer crimes,
or cybercrimes.
This course outlines the current and emerging trends in cybercrime from a holistic perspective and how
they are being countered. It also discusses emerging technologies and how they might be secured and
misused.
                                                                                                                22
Cyber Management
and Governance
Course overview
 Cyber Management and Governance equips you with the skills for weighing competing challenges for the
management of cyber and related governance activities in an organisational context. You will learn how to
develop cyber strategies, policies and to apply a critical eye to the cyber challenges facing organisations
today. Building an understanding of how these governance tools impact people and the efficacy of cyber
security controls and practices.
Fundamentals of Coding:
C and Assembler
Course overview
This course will teach you how to program to C and low-level assembly language. It forms an introduction
to programming in C and a low-level understanding of the underlying operation of modern computers.
C is introduced slowly and at each step we see how C programs are compiled into corresponding
machine code and the details of how the computer actually then executes the program.
This course is suitable even if you have never programmed before or have programmed but are not
familiar with C, or assembly. or would like a refresher through the lens of cyber security.
                                                                                                           23
Operating System Fundamentals
for Security^
Course overview
This course introduces students to the fundamentals of modern operating systems including how they
are attacked, their security mechanisms, and countermeasures. It provides an in-depth look at the
services provided by modern Operating Systems, from a security perspective.
Assumed knowledge: Students are expected to be familiar with TCP/IP networking across OSI
layers 2-7 and programming / scripting in python or equivalent.
                                                                                                     24
Reverse Engineering^
Course overview
This overall aim of this course is to examine the link between high level code written by humans and low
level code executed by systems. An understanding of the ways in which these can differ is essential
for developing exploitation skills, and for low level defensive design and testing. This course requires
entering students to already understand higher level programming languages such as C and low
level machine code for common microprocessors such as x86/x64 or ARM. Students learn software
assurance and security analysis as well as basic malware analysis.
Digital Forensics^^
Course overview
Digital forensics is an under-represented area of cyber security. It encompasses the processes and
technical understanding surrounding both the investigation of computer crimes and crimes where
evidence remains on computing devices. This course provides a strong foundation for both those
wanting to specialise in this area of cyber security, and those seeking to understand the processes for
improved incident response. Students will be able to forensically analyse digital devices and understand
the ethical, legal and self care issues associated with cybercrime investigations.
For more information about assessing The Capstone Project, please check here
                                                                                                            25
Security Engineering Capstone
Project^^
Course overview
Capstone Project provides a self-directed learning opportunity, to allow you to apply the skills learned
in this program to an exploratory management or leadership project in cyber security. You will have
individual responsibility for the timely completion of a significant engineering or research project under
the guidance of a member of academic staff. You will be expected to demonstrate a professional level of
preparation, planning, execution, testing and documentation. You will be expected to meet a number of
strictly enforced milestones and to take considerable initiative in overcoming obstacles.
This project will need to be pre-approved. Example projects include integrating your learning into a
business or organisation, directed novel research (either individually or in a group), or a researched paper
that benefits the community at large. Example projects include contributing to, or making new software
that benefits the community, a directed project to produce novel research (either individually or as a
group), conducting a security assessment and providing appropriate feedback, or integrating your new
skills into a business or organisation. This course aims to both integrate the skills and knowledge from the
different courses within the degree, and also to provide opportunities to focus on areas that interest you.
26