Search for

degree programs, courses & careers


**Program alert**

This program has no further intakes, please see the Master of Cybersecurity (LMCY).


To provide a graduate qualification in Cyber Security to meet the demands of Law Enforcement, Australian Government, Defence, Security and banking industry and provides a pathway to PhD.


Content and structure

The program consists of core studies in Forensic Computing (Electronic Evidence), Network and Device Forensics, ISO 17025 Forensic Laboratory Accreditation, Information Assurance and Security, Secure Software Development, Critical Infrastructure and Process Control (SCADA) system security, and two final thesis courses (including Research Methods). A total of 54 units of study must be completed for the degree.

The program will be offered in both: traditional mode over 13 weeks x 2 hour seminar and 1 hour practical per week in SP2 and SP5; and intensive block teaching mode, 5 days x 8 hours over 1 week in SP2 and SP5 with ongoing web mediated support.


Program Structure
Course nameArea and cat no.UnitsReference
First Semester (Study Period 1 or 2)
Electronic Evidence 1 - Forensic ComputingCOMP 50644.5
Electronic Evidence 2 - Network and Internet ForensicsCOMP 50654.5
Intrusion Analysis and ResponseCOMP 50674.5
Critical Infrastructure and Control System SecurityCOMP 50624.5
Second Semester (Study Period 5)
Electronic Evidence Analysis and PresentationCOMP 50664.5
Information Assurance and SecurityCOMP 50684.5
e-Crime, e-Discovery and Forensic ReadinessCOMP 50634.5
Software Security LifecycleCOMP 50694.5Note(s): 2
First Semester (Study Period 2), Second Semester (Study Period 5)
Research MethodsINFT 40174.5Note(s): 2
ITMS Masters Minor Thesis 1COMP 50059
ITMS Masters Minor Thesis 2COMP 50039



  1. The minor thesis may only be taken after all coursework has been completed.
  2. Courses completed in the Graduate Diploma in Science (Cyber Security and Forensic Computing) will be counted towards the Master of Science (Cyber Security and Forensic Computing) program.
  3. Due to the specific requirements of the program and in particular the need for in-class support, international students must enrol in all courses in internal (face-to-face) mode unless specific approval is obtained from the Program Director.


  1. Students are advised that a successful criminal history screening clearance is required for all students prior to undertaking the certified information systems security professional or certified software security lifecycle professional examinations.
  2. Students must choose to take either Software Security Lifecycle OR CIS Research Methods and should seek approval for their choice from the Program Director.
  3. Each course in this program includes one intensive week of half-day workshops. If you cannot attend the workshops please contact the Program Director as soon as possible to discuss alternatives.

Program directors

Dr Elena Sitnikova