Discover the full details of this course, including:
Flexible online learning
Study when it suits you, thanks to 100% online subjects delivered in just 7 weeks. Be supported by UC’s cyber security, legal and HR experts.
Build on your experience
Complement your existing experience and qualifications across a wide range of area such as legal, government, operations and technology.
Strong career outlook
Take advantage of growing career opportunities in one of Australia’s fastest growing sectors.
This course will equip you with knowledge in governance, infrastructure and people management to help protect you and your workplace against cyber-crime.
In this course you’ll:
Workplace ready in 8 months
Intakes in March, July and October
No previous IT experience required
$3,250 per unit ( FEE-HELP available)
*Indicative domestic fee for students commencing in 2023. Fees subject to annual change.
Taught by experts in the industry, it’ll equip students with a foundational understanding and the essential skills needed to build organisational cyber resilience.
Top 3 for employability
UC is ranked in the top three universities in Australia for employment for postgraduate Computing and Information Systems.*
*(THE, 2022)
Top teaching quality in Canberra
UC is ranked number 1 for teaching quality in Canberra by postgraduate Computing and Information Systems graduates.*
#1 in Canberra for skills development
UC is ranked number 1 for skills development in Canberra by postgraduate Computing and Information Systems graduates.*
Australian Cyber security sector roles are set to grow by 27% between 2020-2024.
(AustCyber)
The Australian government predicts very strong future growth for ICT Security.
(Job Outlook)
Australia has an under supply of Cyber Security qualified professionals. Industry is urgently seeking leaders to drive growth.
(AustCyber)
Perfect for working professionals of all levels across a wide range of sectors such as legal, government, operations, technology and more. This qualification is best suited to anyone managing data privacy issues, business process and systems that are at risk of cyber attacks.
Entry requirements