This qualification responds to a skills shortage and urgent need for cybersecurity professionals to be able to defend against threats to organisations’ computer, data, internet and network security.
KEY INFORMATION |
|
Duration | 90 weeks of teaching and exams, 30 weeks of Work integrated Learning (WIL) and 36 weeks of holidays |
AQF Level | 7 |
Course Delivery | Face-to-Face |
This qualification consists of 24 units, made up of 21 core units and 3 elective units, studied over 3 years.
All students enrolled in this qualification are required to undertake Work Integrated Learning. Work Integrated Learning provides the student with the opportunity to put into practice the skills learned in the classroom. Work Integrated Learning requirements will be discussed during Student Orientation.
IHSI will organise the Work Integrated Learning opportunities for students aligned with their chosen interests in particular cybersecurity roles and tasks, and where possible in organisations located close to their address. Should a student wish to change the Work Integrated Learning provider, they will need IHSI suitability approval and this can only take place after IHSI has assessed that organisation and signed a contract with the new provider.
DEV 1.1.1 | Introduction to Programming (Python) |
DEV 1.1.2 | Introduction to Cybersecurity (concepts & real-world practice) |
CRY 1.1.3 | Probability and Statistics |
EMP 1.1.4 | Employability module |
DEV 1.2.1 | Object Oriented programming (JavaScript and Java) |
NET 1.2.2 | Computer Networks |
RSK 1.2.3 | Information Security Management (Risk Management) |
DTA 1.2.4 | Intro to Databases and Security |
DTA 2.1.1 | Data structures and Algorithm (Continuation of Programming) |
ARC 2.1.2 | Data structures and Algorithm (Continuation of Programming) |
NET 2.1.3 | Network Security |
CRY 2.1.4 | Discrete Mathematics |
ADM 2.2.1 | Operating Systems |
CDA 2.2.2 | Computer Security |
ADM 2.2.4 | Computer Organization and Architecture |
FOR 3.1.1 | Computer Forensics |
ASA 3.1.3 | Malware Analysis |
MGT 3.1.4 | Communication module |
PMA 3.2.1 | Planning Engineering / IT Project Management |
CDA 3.2.3 | Ethical Hacking and Defense (Best Practices) |
CAP 3.2.4 | Capstone |
CRY 2.2.3 | Introduction to Cryptography |
DaK 2.2.5 | Docker and Kubernetes |
LNG 3.1.2 | Machine Learning and Data Visualisation |
IAI 3.1.5 | Introduction to AI |
IoT 3.2.2 | IoT and OT (Operational Technology) Security |
PEN 3.2.5 | PEN testing |
Possible career opportunities relevant to this qualification include:
This qualification provides a pathway for students to continue their studies at a postgraduate level. For instance, students can apply for the Master of Cyber Security at Griffith University