Embark on a rewarding career in the growing field of cyber security.
The Graduate Diploma in Information Technology (Cyber Security and Networks) is a course designed to open up a pathway for individuals from an unrelated field of study to transition into the ICT industry, acquiring foundational discipline knowledge and specialising in cyber security. If, however, you are an existing IT professional and wish to develop skills in cyber security, the Graduate Certificate in Cyber Security and Networks will help you upskill and specialise in cyber security.
Of all the specialties within the Information and Communication Technologies (ICT) industry, cyber security is one of the most dynamic. As malicious cyber security threats – originating from individuals or even nation-states – continually evolve, Australian cyber security professionals need the expertise and leadership credentials to innovate and remain one step ahead.
Cyber security professionals are in great demand across Australia as government organisations and businesses struggle to cope with the escalation of national and global cyber security threats. The Australian Cyber Security Growth Network recently predicted that the Australian cyber security industry is poised to triple in size, reaching a revenue total of $6 billion by 2026.
To reach this level of growth, and cultivate a global reputation in cyber security practice and innovation, the current skills shortage in the industry will have to be addressed. In fact, Australia will need almost 18,000 additional cyber security professionals by 2026 to meet these targets.
Or you can contact us online and make an enquiry today.
Looking to upskill your team? Find out how QUT Online can bring top-tier expertise and industry knowledge to your organisation by educating your workforce.
What you will learn
Employ an adaptable and creative digital skill set to craft better ICT solutions for discipline-specific problems.
Cyber Security Expertise
Demonstrate advanced knowledge of cyber security best practice in a range of organisational contexts, and examine the unique legal and ethical issues of data storage and the risk of technological exploitation.
Core Body of Knowledge
Develop a thorough understanding of the ACS’s Core Body of Knowledge (CBOK), with a focus on: problem solving, abstraction, design; ethics and professionalism; teamwork concepts and issues; and interpersonal communication.
Learn practical research, project management and problem solving skills, paving the way for future leadership in the ICT industry.
Investigate the architectural principles that underpin modern computer systems: how they are structured and how they operate.
In this unit you will build your own computer system using simulation software, learn about the ongoing evolution of computer systems, and master fundamental hardware and software concepts that allow you to understand the building blocks that comprise computer systems.
IT systems are powerful tools capable of solving business problems, but to do so operational problems need first to be identified and defined. This unit equips you with both soft skills – to collaborate as part of a team and identify problems – and technical skills in system design to navigate complexities and solve problems.
You will apply visual communication tools as analytical tools to explain design outputs and gain feedback from users and peers, after which you will devise elegant design solutions to resolve contemporary industry problems.
Cyber security breaches – network infiltration, malware attacks, personal and corporate data theft – are commonplace and on the rise. In an increasingly globalised world with interconnected computer systems, the risks of malicious cyber security attacks are already threatening to have a global impact.
This unit introduces essential information security concepts such as confidentiality, integrity and availability. You will study the Open Systems Interconnection (OSI) model in order to better understand network communications, and enhance your ability to identify information security vulnerabilities and threats in a range of networked scenarios.
You will develop a practical skill set that allows you to identify and anticipate cyber security risks and vulnerabilities, and work towards reinforcing cyber security practices in an organisation through the use of numerous strategies including cryptography, identity control, and general network and communications security.
Database management is both a technical challenge for businesses and organisations, as well as a societal and ethical one.
This unit covers the design thinking behind rigorous database management, standard database querying techniques, all in accordance with the ethical aspects of data management, storage and use.
You will study conceptual data modelling techniques to understand, analyse and capture an abstraction of the complex data aspect of business domains. By doing so you will learn to design a database from a relational database schema and implement effective, ethical and culturally sensitive solutions to database management problems.
Programming is a technical skill well worth taking the time to master. Even if you haven’t learnt any programming in the past, this unit will introduce you to the basic building blocks of programming algorithms: sequence, selection, iteration, and how algorithmic thinking itself is used to break down problems into simpler steps.
Using C# language to express these steps in universal programming language, you will learn about the imperative style of programming in which a sequence of statements change the program’s state.
You will learn practical troubleshooting skills, and how to debug and test programs to ensure their correctness, as you simultaneously develop an understanding of program syntax and compiler errors.
Object oriented programming is a multi-dimensional method of combating complexity, particularly when developing larger programs. In this unit you will explore the key concepts of abstraction, encapsulation and polymorphism:
• Abstraction is the process of naming known quantities and identifying common properties of a collection of objects.
• Encapsulation is the process “putting things in a box” – selectively exposing some aspects of what’s in the box, but deliberately hiding other aspects.
• Polymorphism is the concept of an object being able to have different.
By using the C# programming language in combination with these concepts, you will learn how to break down complexity and develop practical programming solutions.
Explore the conceptual frameworks that guide web application development, learning how frameworks such as Bootstrap and Python-Flask are integral to robust and effective web development.
This unit covers the web development process, from initial design to development and finally deployment.
You will gain hands-on experience with the model view controller (MVC) architecture pattern, and learn about the specific functionality of MVC components, and how these contribute to the software architecture of a web application. You will also make use of Application Programming Interfaces (APIs) that are managed through MVC platforms.
Organisations are continually transforming to leverage the potential of information systems. A key part of this ongoing evolution is ensuring leadership teams are aware of the nature of an information system, how best to manage its components and subsystems effectively, and how to make informed decisions based on data.
This purpose of this is to provide insights into how to appropriately identify issues facing organisations, and then develop information systems that help resolve these issues.
Drawing on real-world case studies, you explore core concepts including the components of information systems, the design cycle, business analytics, and ethical and privacy considerations.
Object Oriented Design is a methodology that identifies potential objects and classes by analysing programming models, allowing you to solve complex problems with real-world implications. Basing software design on entities that exist in the real world maximises the chance that software architecture will age and evolve gracefully, primarily because the choice of objects remain stable.
In this unit you will learn about and apply standard software design principles such as SOLID, DRY, KISS and YAGNI. Crucially, you will learn how such designs are professionally communicated and used as part of agile design processes.
Data structures define modern computer science, for instance those used to represent strings, dictionaries, lists, trees and graphs.
In this unit you will learn and implement the algorithms commonly used for searching, sorting and processing these data. You will learn both how to assess the efficiency of these algorithms and distinguish between those that can process large amounts of data efficiently, and those that run unacceptably slowly as the size of the input grows.
The ability to understand, analyse, design, configure and manage computer networks and network services is a requirement for a range of graduate entry information technology positions.
This unit introduces core concepts that govern computer network administration and the Internet, in particular layered network architecture and models, hardware and software, TCP/IP protocol stack, addressing and routing, wireless networks, network security, and network services and applications. You will learn how modern computer networks and the Internet work, and how they are structured.
Information is a vital organisational asset. Information systems store, process and exchange information, and most economic sectors are dependent on electronic and automated systems. Interconnectivity is important for many organisations, but this is also increases the exposure to adverse events, necessitating the need for thorough information security management.
This unit builds upon fundamental information security concepts, including the management of information systems that affect organisational information security: identity management, authentication, access control, monitoring, risk management, incident response and disaster recovery.
Data privacy and security are critical areas of legal risk in the digital era. In this unit students will develop an awareness of how workplace data use is effectively regulated to protect the privacy of people’s data. You will have the opportunity to examine both national and international data collection obligations, with an emphasis on the key responsibility of data custodians to secure data to prevent unauthorised use. You will also develop your ability to synthesise knowledge from various legal sources to identify legal risks in a digital data-driven context.
Our dedicated support team are here to help you when you need it. They are available online or over the phone seven days a week to answer all your questions. They are here to help with everything from technical support to academic questions. QUT Online has the tools and people to make your postgraduate study achievable and enjoyable.