Course Information

Bachelor of Science (Cyber Security)

Effective from 01-JAN-2025 : Code Y89

This course focuses on the practical and theoretical dimensions of cyber security across a range of fundamental areas, such as network security and vulnerability assessment, information security policy and governance, digital forensics, and ethical hacking. Students will gain a solid grounding in conventional computer and network security concepts and skills. In addition, the course is designed to meet the changing landscape of secure computing, which involves not only computers, but also network enabled devices such as smartphones, tablet devices, and Internet of Things (IoT).

Disclaimer

This course information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester. In particular please check the course requirements and the unit and unit set offerings, as these differ according to course delivery location.

Work Experience Option

Students have the opportunity to seek a Work Integrated Learning placement with an industry partner, equivalent to one semester of full-time study.

Duty of care

Students, the WIL host organisation and the school's WIL Coordinator must complete a WIL documentation pack (which includes all required OSH and Risk Assessment documents) before the placement can commence. WIL host organisations may have additional clearance requirements of applicants, including evidence of police clearance or non-disclosure agreements. There may also be vaccination or other similar requirements, including those imposed by government or third-party placement hosts, that apply to Professional Placements which form part of your course. Please consider this requirement before applying for Professional Placement and speak with the WIL and Course Coordinator if this raises any concerns. You may not be able to complete the Professional Placement unit if you are unable to meet the placement requirements.

Attendance requirements

Students are required to complete a placement which is equivalent to one semester of full-time study. Whilst attendance is negotiated with the WIL host organisation, typically students will be expected to undertake a minimum of 300 hours over a maximum of 17 weeks. Typical full-time placements usually comprise 450 hours of professional placement.

Application process

Students are required to apply in writing to the Work Integrated Learning Coordinator (the student's Course Coordinator can advise who is the responsible staff member) upon successful completion of 240 credit points of study. Students should seek the advice of their Course Coordinator and the WIL Coordinator as to the appropriateness of pursuing the work placement option within their course structure. Successful applicants will need to complete any directed pre-placement preparation activities.

Enrolment process

Approved applicants for Work Integrated Learning must enrol in and complete the requirements for CSI3750 Professional Placement (Computing and Security). This unit represents a full semester study load. Students are advised not to enrol in any additional units while undertaking this unit.

Implications of failing

Failure to successfully complete CSI3750 will necessitate completing CSG3101 and 30 credit points of electives.

Course Learning Outcomes

  1. Apply comprehensive knowledge of concepts, principles and techniques in the cyber security discipline to both theoretical as well as practical situations.
  2. Exercise critical thinking and judgement to investigate and solve problems relating to cyber security issues in digital systems and networks.
  3. Apply creative thinking to identify and solve cyber security challenges.
  4. Use digital technologies and cyber security software tools for assessing and evaluating cyber security information.
  5. Apply communication skills to demonstrate independence in design and analysis of cyber security solutions and presenting documented results.
  6. Incorporate an awareness of cross-cultural issues and demonstrate cultural and indigenous competence in professional practice in the cyber security area.
  7. Work collaboratively in the application of knowledge and skills to identify issues and make decisions relevant to cyber security.
  8. Demonstrate creativity and initiative to generate ideas for planning and implementing independent projects in the cyber security discipline.

Professional Recognition

Course

This course has been Accredited by: Australian Computer Society (ACS).

Admission requirements

Admission requirement (Band 3)

All applicants must meet the academic admission requirements for this course. The indicative or guaranteed ATAR is as published (where applicable) or academic admission requirements may be satisfied through completion of one of the following:

  • AQF Cert IV;
  • Successfully completed 0.25 EFTSL of study at bachelor level or higher at an Australian higher education provider (or equivalent);
  • Undergraduate Certificate;
  • Skills for Tertiary Admissions Test;
  • University Preparation Course;
  • Indigenous University Orientation Course; or
  • Experience Based Entry Scheme.

English Language requirement (Band 3)

English competency requirements may be satisfied through completion of one of the following:

  • Year 12 English ATAR/English Literature ATAR grade C or better or equivalent;
  • Special Tertiary Admissions Test;
  • IELTS Academic Overall band minimum score of 6.0 (no individual band less than 6.0);
  • Successfully completed 1.0 EFTSL of study at bachelor level or higher in the UK, Ireland, USA, NZ or Canada;
  • University Preparation Course;
  • Indigenous University Orientation Course;
  • AQF Diploma, Advanced Diploma or Associate Degree;
  • Successfully completed 0.375 EFTSL of study at bachelor level or higher at an Australian higher education provider (or equivalent); or
  • Other tests, courses or programs as defined in the Admissions Policy.

Australian Qualifications Framework (AQF) level

This course has been accredited by ECU as an AQF Level 7 Bachelor Degree Award.

Course Duration

  • Full Time: 3 Years
  • Part Time: 6 Years

Course Delivery

  • Joondalup: Full Time, Part Time
  • Online: Full Time, Part Time
  • PSB Academy: Full Time, Part Time
  • ECU Sri Lanka: Full Time, Part Time
  • HKU School Of Professional And Continuing Education: Full Time, Part Time

Course Coordinator

Dr Ahmed IBRAHIM

Course Structure

Year 1 - Semester 1
Unit Code Unit Title Credit Points
SCI1125Professional Science Essentials15
CSP1150Programming Principles15
MAT1252Mathematics for Computing15
CSI1241Systems Analysis15
Year 1 - Semester 2
Unit Code Unit Title Credit Points
CSG1105Applied Communications15
CSI1101Computer Security15
ENS1161Computer Fundamentals15
CSG1207Systems and Database Design15
Year 2 - Semester 1
Unit Code Unit Title Credit Points
CSI2108Cryptographic Concepts15
CSI2450IoT and OT Security15
CSP2101Scripting Languages15
CSG3309IT Security Management15
Year 2 - Semester 2
Unit Code Unit Title Credit Points
CSI3207Network Security Fundamentals15
CSG2344Project Methods and Professionalism15
CSI2107Software Reverse Engineering15
CSG2305Computer Forensics15
Year 3 - Semester 1
Unit Code Unit Title Credit Points
CSI3208Ethical Hacking and Defence15
MAT3120Machine Learning and Data Visualisation15
CSI3350Enterprise Security and Governance15
CSI3351Cyber Security Incident Detection and Response15

Year 3 - Semester 2

STRUCTURE 1 - for students who are NOT undertaking a Work Integrated Learning placement
Unit Code Unit Title Credit Points
CSG3101 ^Applied Project30
Elective Unitx 230
STRUCTURE 2 - students approved for a Work Integrated Learning placement enrol in:
Unit Code Unit Title Credit Points
CSI3750 ^Professional Placement (Computing and Security)60

^ Core Option


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Y89|9