fbpx

Bachelor of Cyber Security

Introduction

Cyber security threats are a rapidly growing global challenge for individuals and businesses alike. Secure technology is not only pivotal to business, but to everyday life. As a result, cyber security professionals are in high demand around the world. Deakin’s Bachelor of Cyber Security equips students with the essential skills to investigate and combat cybercrime and cyber terrorism. Students will graduate with the expertise to tackle one of the fastest growing criminal threats to modern-day society.

Deakin University, Australia  

Located in Victoria, Australia, Deakin University is a public university. The university was named for Australia’s second prime minister, Alfred Deakin, when it was founded in 1974. Along with the online Cloud Campus, its main campuses are in the Burwood suburb of Melbourne, Geelong Waurn Ponds, Geelong Waterfront, and Warrnambool. ERCI runs its classes on a lecture-tutorial system. The average teacher-student ratio for lectures and tutorials are as follows:

  • Lectures – 100 Students to 1 Lecturer
  • Tutorials – 35 Students to 1 Tutor
Course Delivery

This programme is available in full time mode, and will take 36 months to complete. Students will attend 9 semesters of academic study, and are expected to complete up to 4 credit points each semester. Students will attend classes 5 days a week on weekdays.

Course Structure: Bachelor of Cyber Security 
 
Module Descriptions
Year 1
  • Introduction to Programming

In this unit students will learn the fundamentals of structured programming and explore the mechanics of how these programs operate within the computer.

  • Computer Systems

 In this unit, students will learn the building blocks of computing systems and the tools used information technology professionals. The unit connects students with hardware and software elements of computer systems, ensuring they are ready to engage with configuring, operating, and building computing systems.

  • Real World Practices for Cyber Security

 Students will learn the real world practices of cyber security by solving problems based on realistic case studies. Students will explore fundamental concepts of risks in managing communication networks and choose the appropriate means to manage these risks.

  • Discrete Mathematics

Students will learn how to rigorously build, from first principles, the tools needed to address a wide range of mathematical and scientific problems. The topics covered include number theory, propositional and predicate logic, graph theory, sets, functions, recurrences, and combinatorics.

  • Academic Integrity Module

Students will develop knowledge, skills and good practice principles to understand the importance of maintaining academic integrity in their studies and career and to avoid breaching academic integrity standards.

  • Safety Induction Program

This is a program of safety information for students involved in information technology laboratory work. The program encompasses information technology hazards, building evacuation procedures, laboratory accident management, first aid procedures, and safety procedures particular to laboratory work.

  • Career Tools for Employability

Emphasizing the creation of a strong online presence, including crafting effective resumes and LinkedIn summaries, students develop vital communication skills for professional advancement

  • Computer Networks and Communication

Students will gain a deep understanding they need of how network protocols across the stack operate, while providing them with the programming and technical skills needed to analyse them. This will provide the focused technical foundation they need to be successful in the course.

  • Object-Oriented Development

Students are introduced to object-oriented programming as the fundamental paradigm of modern programming languages and software development. Upon completion of the unit, the students will be ready to develop real-world software following the software design and structure best practices.

  • Database Fundamentals

Students will learn how to construct entity-relationship (ER) diagrams, ensuring that the model’s semantics match those of the real-world object it represents. It also teaches how to construct, maintain, and retrieve information relational databases using SQL. Through real-world business case scenarios and project-based learning, students will gain the skills required to design, implement, and manage databases.

  • Cryptography

Students will learn the fundamental mechanisms of classic and modern cryptographic systems, which span from Caesar cipher of Roman times to Advanced Encryption Standard (AES) cipher invented in the early 21st century. On completion of this unit students will understand the different types of cryptographic procedures introduced both in the past and present and be able to analyse these procedures as to their effectiveness.

  • Data Structures and Algorithms

This unit introduces students to in memory data modelling and computational trade-offs when developing software. This unit will extend student programming capabilities by exploring the application and implementation of different data structures and algorithms and considerations associated with appropriate selection of these tools to meet different system requirements.

Year 2
  • Computer Forensics and Investigations

In this unit, students explore various options available to organisations to investigate problems and attacks on their computer systems. It enables students to develop knowledge of laws governing the IT domain and apply approaches to investigating cyber-crime using digital forensic techniques.

  • Cyber Security Analytics

 Students will learn about the various data analytical methodologies used to investigate cyber security problems. In particular, we will focus on processing and analysing data relevant to cyber security systems and applications.

  • Full Stack Development: Secure Backend Services

This unit focuses on the backend technologies for the full stack development, including programming service APIs, creating databases and cloud deployment.

  • Secure Coding

This unit comprises the principles of security for software development. Topics covered include the Continuous Delivery (CD) model for secure software development, adoption of cutting-edge software security tools for data validation, code bug detection, web application vulnerability assessment, secure database design and cloud/API security.

  • Professional Practice in Information Technology

Students will be introduced to IT workflows, agile project management, dev-ops pipelines, version control, and the ways these tools fit together in modern companies. The use of these technologies is underpinned by the behaviours, teamwork, and ethical considerations needed to engage in working in IT in a professional manner. 

  • Full Stack Development: Secure Frontend Applications

This unit focuses on the frontend part of the full stack development process by using web technologies for programming frontend interfaces, interact with services and databases to create applications that support a wide variety of device capabilities.

  • Advanced Network Security

This unit will provide students the advanced understanding of networks needed for success in the field. The unit will cover a range of advanced and emerging technologies, such as Software Defined Networks, Internet of Things, and AI based networking.

Year 3
  • Malware Analysis

This unit will provide a comprehensive overview of malware development and detection strategies, as well as the common tools used in the area of malware analysis and development.

  • Network Forensics

This unit teaches the main techniques and tools needed to successfully investigate attacks against modern computer networks, including how to detect the attacks, how to attribute them, and how to mitigate damage and prevent further damage.

  • Advanced Network Analytics and Forensics

This unit will introduce students to advanced topics in network analytics and forensics. Students will learn to work effectively with the large datasets generated modern networks, as well as utilize supervised and unsupervised machine learning approaches to analytics and forensics.

  • Team Project (A) – Project Management and Practices

 Students will learn about project management methodologies and practices, with a particular emphasis on agile project management. Students will develop hands-on experience in using industry standard tools to contribute to the project, analyse requirements, design solutions, monitor project progress and productivity, and reflect on sprint and project outcomes. 

  • Ethical Hacking

This unit introduces ethical hacking and penetration testing techniques to students. Students will perform cyber attacks to machines and applications with certain security vulnerabilities.

  • Mobile Application Development

Students will cover the design and the workflow of developing apps in one mobile application platform, a framework for constructing an application, as well as tools for developing, testing, and publishing software for the platform. Students will focus particularly on learning advanced concepts and APIs, and putting those skills into practice to develop a real-world mobile app.

  • Team Project (B) – Execution and Delivery

 Students will identify a potential problem or technical gap and experience how to solve it using methods, algorithms and techniques pertinent to the field of IT. Students will be required to further formulate necessary design and/or development strategies, work collaboratively with peers to manage and conduct the implementation of the project and demonstrate outcomes achieved against project goals and targets.

  • IT Placements and Industry Experience

In this unit, students will undertake professional work experience with an approved host organisation for a minimum of 100 hours. This systematic opportunity will provide students with experiences being in an organisation, critically reflecting on their Course and Graduate Learning Outcomes, and their discipline- Course Details specific and generic competencies.

Course Availability

Intakes for the programme are available 2 times a year. All applications should be submitted to ERCI no later than 2 months before the commencement date.

Assessment Framework

Courses are assessed by a combination of coursework, practical assignments and examinations. Formative assessments will also be included, as well as self- and peer-assessment and a capstone project.

Entry Requirements
Academic:
  • Minimum 3 GCE ‘A’ Level passes (with Grade D and above) in Mathematics and 2 other subjects other than English Language OR
  • IB Diploma OR
  • 12 years of formal education from recognised international institutions OR
  • Any combination of the above or equivalent as determined by the university as successfully meeting the minimum entry criteria of 12 years of formal education

Note: for mature students who do not meet the above entry requirements, they must be 30 years and above with a minimum of 8 years of working experience and meet language requirements.

Language:
  • Grade C in the General Paper or in a Humanities and Social Sciences subject at H1 or H2 level at GCE ‘A’ Levels OR
  • IELTS overall score of 6.0 (with no band score less than 6.0) or equivalent
Age:
  • Applicants should be at least 18 years old (based on birth year) at the time of registration
Graduation Requirements:

Students must successfully complete, or be credited with, 24 credit points within the stipulated period of study as set by the University, either via module exemptions or completion of requisite modules.

Course Fees

For a full listing of course fees and other charges, please select one of the following:

apply now

By submitting your personal information above, you have given your consent for a ERC Institute representative to contact you on offers, promotions and information for ERC Institute programmes.

Ms. Yen Ong
CEO, ERC Institute

Yen has a proven track record in various key business development & marketing roles involving evolution and change management. Her pilot roles in various media organisations of Cable TV (Singapore Cable Vision), Regional TV (MTV), Internet Advertising (China.com) and Digital Music (Soundbuzz & Motorola) at their nascent stages is a testimonial of her experience and expertise of driving businesses whilst embracing new technology. Her acumen and passion are evidenced in multiple “first to market” products and projects she has been involved in cutting across from media to digital products. Always pushing the concept of creative solutionism while building strong relationships with customers has translated to dynamic growth for the various companies. Being an ardent believer in change management to stay on top of ever changing economies, her current role as Chief Executive Officer of ERC Institute sees interesting forays leveraged on her experience.

TRAINING ROOM Enquiry

We will keep in touch with you soon after submitting the below form. 

By submitting your personal information above, you have given your consent for a ERC Institute representative to contact you on offers, promotions and information for ERC Institute training room rental. 

Thank You! Please check your mailbox. We have sent you the brochure.