Quick Facts
Credential
Master's Degree
Delivery Options:
Both On-Campus and Online - Some of your Classes will be in-person, on campus and some will be done online.
Duration: 2 years
With a typical full-time course load, this programme will take 2 years to complete.
Language of instruction
english
Admission Requirements
One will first satisfy the general requirements for admission to Victoria University prior to being considered for admission to the programme. Admission to the programme shall be open to the following category of candidate:
Holder of a minimum of second-class honours undergraduate degree that has content rich in Information Systems Security, Information systems, computer science, software engineering or mathematics.
Holder of postgraduate diploma in Information system security, Information Systems, Computer Science, Software Engineering and Computer Engineering from a recognized University/ Institution.
Any other relevant degree from a recognized university/institution with evidence of having taken a considerable number of acceptable courses related to the Information system security or Information Systems discipline
Applicants whose first language is not English will be required to demonstrate a proficiency in the English language by passing an English proficiency Test conducted by the University.
What you will Learn
At the end of this programme, the MSc. Cyber Security students would have:
Practical applied skills relevant to current and emerging demands in the cyber security field.
The ability to master the latest and most relevant tools, techniques, strategies and technologies.
The ability to think critically about how organisations manage security.
Direct access to industry professionals with specific expertise in key areas of cyber security.
Experience of working with real-world case studies that reflect new and timely challenges.
Independent critical and evaluative skills, and intellectual curiosity for life-long learning.
Career Opportunities
A Master's degree in Cybersecurity can open up various career opportunities in the fast-growing field of information security. Here are some potential career paths for someone with a Master's degree in Cybersecurity:
Cybersecurity Analyst: As a cybersecurity analyst, you would be responsible for monitoring and analyzing security incidents, identifying vulnerabilities, and implementing security measures to protect an organization's systems and data. You may also conduct risk assessments and develop security policies and procedures.
Security Consultant: As a security consultant, you would provide expert advice to organizations on how to improve their security posture. This could include conducting security audits, developing security strategies, and recommending security technologies and best practices.
Security Architect: As a security architect, you would design and implement security solutions for complex IT systems, networks, and applications. You would ensure that security controls are integrated into the architecture of an organization's IT infrastructure, and that security requirements are met throughout the system development life cycle.
Incident Response Analyst: As an incident response analyst, you would be responsible for responding to security incidents, investigating and containing security breaches, and implementing measures to prevent future incidents. You may also work with law enforcement agencies and other stakeholders to investigate and mitigate cyber threats.
Penetration Tester/Ethical Hacker: As a penetration tester or ethical hacker, you would assess the security of an organization's systems and networks by simulating attacks to identify vulnerabilities. You would then provide recommendations on how to patch and mitigate those vulnerabilities to improve an organization's security posture.
Security Manager: As a security manager, you would oversee the development, implementation, and management of an organization's security programs and policies. This could include managing a team of security professionals, developing security budgets, and ensuring compliance with regulatory requirements.
Cybersecurity Researcher: As a cybersecurity researcher, you would conduct cutting-edge research on emerging threats, vulnerabilities, and technologies in the field of cybersecurity. You may also publish research findings, develop new security tools, and contribute to the advancement of the field.
Chief Information Security Officer (CISO): As a CISO, you would be the highest-ranking executive responsible for an organization's overall information security strategy and management. You would work closely with senior leadership to develop and implement security policies, manage risk, and ensure the confidentiality, integrity, and availability of an organization's information assets.
Tuition & Fees
The tuition and fee amounts are estimates based on current academic year's rates. For financial planning purposes, please use these totals as an approximate estimate of your costs. Actual fees may vary by term and enrolment activities.
Download