Contact IT Masters
Enrolments: 207,290

Master Degree and Graduate Certificate Course Enrolments: 7,138

The total number of Master degree and Graduate Certificate enrolments since Charles Sturt University and IT Masters launched our first qualification in 2003.

Short Course Enrolments: 200,152

The total number of enrolments in our free short courses that we offer as a ‘taster’ of what it is like to study via Distance Education with Charles Sturt University.

Master of Information Systems Security (2015)

What is this course about?
The Master of Information Systems Security prepares students for the challenging task of identifying and producing solutions to threats that endanger information system resources. Preparation for the world’s leading IT Security industry certifications is included as an integral part of the course.
Aims & Objectives
The aim of this course is to provide computing professionals with the theoretical knowledge and technical and communication skills necessary to embark on a career as a computer security professional with either the corporate or government sector. The course also provides a pathway to doctorate level study in the field of computer and network security. Upon completion of this course, graduates will be able to :

  • demonstrate and apply knowledge of current trends in ICT security, particularly those that relate to security protocols and policy, cryptography, malware, digital forensics, and legal evidence;
  • investigate emerging security trends and their application to professional practice;
  • effectively communicate IT security concepts and solutions in a variety of professional settings;
  • apply skills in the identification of security threats, implementation of secure system properties, security testing, and incident response;
  • critically evaluate and reflect on ethical issues that relate to the IT discipline;
  • employ research skills that apply to the practice of computer security in a professional context;
  • demonstrate application of knowledge and skills through a capstone experience.

Entry requirements
Applicants are required to have an undergraduate degree from a recognised Australian tertiary institution (or a qualification deemed to be equivalent) and appropriate work experience.
Course structure
The course consists of 12 subjects with a total value of 96 points. For students that do not qualify for any credit, the recommended duration to complete the Masters Degree is 2 years. There are 3 sessions per year and we recommend a commitment of 2 subjects per session.
Core Subjects (8 subjects)
ITC506
Topics in Information Technology Ethics
ITC571
Emerging Technologies and Innovation
ITC593
Network Security
ITC595
Information Security

Abstract

This subject allows students to develop skills that are necessary to identify ethical issues that are raised as a result of the advancement of information and communications technology (ICT). The subject will cover areas such as critical thinking, professionalism, ethical theories, privacy, security and crime in cyberspace, intellectual property, freedom of speech and regulation of the internet, systems reliability, and social and ethical issues of emerging technologies. By the end of the subject students should be able to argue consistently and rationally about the moral problems raised by the adoption and use of ICT and propose solutions to those moral problems.

ITC506 - Topics in Information Technology Ethics will cover the following topics:

  • Introduction to ICT ethics.
  • Introduction to critical thinking techniques.
  • Professionalism and professional ethics.
  • Ethical theories and analysis.
  • Privacy.
  • Security and crime in cyberspace.
  • Intellectual property.
  • Freedom of speech and Internet content regulation.
  • Emerging technologies and ethics.
  • ICT and Society.

Assessment

  1. Doing Ethics Technique (1000 words - 15%)
  2. Online Quiz (10 questions - 15%)
  3. Applying Ethical Theory (1300 words - 20%)
  4. Final Exam (50%)

Subject Availability

Session 1 (Feb), Session 2 (July), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

*Capstone subject. This subject should be completed in the final session of study

Abstract

This subject requires research and project work, at an advanced level, on a topic related to emerging technologies and innovation. In the context of professional practice, students will draw upon prior learning in their Masters course to execute an independent capstone project in a selected topic in Information Technology.

ITC571 - Emerging Technologies and Innovation will cover the following topics:

  • Introduction and selecting a capstone topic area to review.
  • Project design, planning, execution and reporting.
  • Research Skills: locating and evaluating information, credibility of sources and referencing.
  • Extracting information from readings for critical analysis.
  • Preparing and writing a literature review or capstone report.
  • Presenting your project.

Assessment

  1. Project Blog for Weekly Progress Reports (10%)
  2. Project Proposal and Plan (2000 words - 10%)
  3. Annotated Bibliography (2000 words – 25%)
  4. Research Innovation and Ethical Analysis Quiz(15%)
  5. Project Closure: Project Report (Blog) and Seminar (40%)

Subject Availability

Session 1 (Feb), Session 2 (July), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

ITC593 provides a practical survey of network security protocols and standards, along with an in-depth introduction to the field of cryptography. ITC593 explores how digital signatures, encryption algorithms, and hash functions are used to satisfy various security goals, such as authentication, confidentiality, and integrity. ITC593 also includes a comprehensive coverage of two important network security services, Kerberos and PKI (Public Key Infrastructure).

ITC593 - Network Security will cover the following topics:

  • Introduction to computer and network security.
  • Introduction to cryptography.
  • Secret key (symmetric) algorithms.
  • Modes of operation.
  • Public key (asymmetric) algorithms.
  • Number theory.
  • Authentication systems.
  • User authentication.
  • Security handshakes.
  • Kerberos.
  • Public key infrastructure (PKI).

Assessment

  1. Assignment 1: Online Quizzes (Five quizzes - 20%)
  2. Assignment 2 (3 tasks - 15%)
  3. Assignment 3 (2 tasks - 15%)
  4. Final Exam (50%)

Subject Availability

Session 2 (July), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides a broad overview of information security concepts, with an emphasis on combating security threats to operating systems, computer programs, databases and networked systems. Students will also study foundational security policies that stipulate requirements about integrity, confidentiality and availability. Techniques for implementing these policies are also investigated, including memory management techniques, access control mechanisms, user authentication, and networking tools.

ITC595 - Information Security will cover the following topics:

  • Overview of computer security.
  • Introduction to cryptography.
  • Malicious code.
  • Operating systems security.
  • Access Control Theory.
  • Trusted operating systems.
  • User authentication.
  • Security policies and models.
  • Networking threats.
  • Networking controls.
  • Database and data security.

Assessment

  1. Online quiz (5 quizzes - 10%)
  2. Research Report task (1800 words - 20%)
  3. Research Project (20%)
  4. Final Exam (50%)

Subject Availability

Session 1 (Feb), Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
ITC597
Digital Forensics
ITE525
Cyber Law
ITI581
Security Fundamentals
MGI521
Professional Communications

Abstract

This subject provides an in-depth study of the rapidly changing and fascinating field of computer forensics. It combines both the technical expertise and the knowledge required to investigate, detect and prevent digital crimes. The subject covers the knowledge on digital forensics legislations, digital crime, forensics processes and procedures, data acquisition and validation, e-discovery tools, e-evidence collection and preservation, investigating operating systems and file systems, network forensics, art of steganography and mobile device forensics, email and web forensics, presenting reports and testimony as an expert witness.

ITC597 - Digital Forensics will cover the following topics:

  • Relevant legislation and codes of ethics
  • Digital crime, civil and criminal law
  • Computer forensics and the digital detective
  • Forensic processes, policies and procedures
  • Fraud and forensic accounting
  • E-Discovery, guidelines and standards
  • E-Evidence, tools, environments and equipment
  • Systems basics and file systems
  • Investigating operating systems
  • Email and web forensics
  • Network forensics and intrusion detection
  • Reporting and presenting

Assessment

  1. Assignment 1 (3 tasks - 20%)
  2. Forensics Report (3 tasks - 30%)
  3. Final Exam (50%)

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides computer forensics and security professionals with a strong foundation in the rapidly changing field of e-commerce and IT Law. The subject teaches both the technical expertise and knowledge required to create policy and write reports, communicate with solicitors and barristers and have a strong understanding of legal issues and case law.

ITE525 - Cyber Law covers the following topics:

  • The foundations of law and jurisprudence
  • Common law and case law
  • Civil law (Tort and contract)
  • Criminal law
  • Evidence law
  • Law of Fraud
  • E-Discovery, guidelines and standards
  • The Law of IT compliance: How to conduct investigations
  • Intellectual property law
  • Trade law and electronic and e-commerce law
  • International law and issues of jurisdiction
  • Applying law to emerging dangers: Cyber defense and digital forensics
  • Relevant legislation and code of ethics

Assessment

  1. Case Study (1500 words - 20%)
  2. Research Essay (2500 words - 40%)
  3. Open Book Exam (40%)

Subject Availability

TBD 2017

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This is an industry-based subject that will help students prepare for the Security+ industry qualification which has been developed by the International Computer Technology Industry Association (CompTIA) to demonstrate vendor-neutral IT security knowledge and skills. Students will also be introduced to a broad range of computer security topics that include infrastructure security, communications, cryptography, access control, authentication, external threats, and operational and organisational security. Students will also learn to apply these concepts to protect computing infrastructure from security threats.

ITI581 - Security Fundamentals will cover the following topics:

  • Network security
  • Network design elements and components
  • Compliance and operational security
  • Threats and vulnerabilities
  • Types of attacks
  • Risk mitigation strategies
  • Appropriate security controls
  • Disaster recovery plans and procedures
  • Application, data and host security
  • Access control and identity management
  • Cryptography
  • Intrusion detection systems
  • Preparing for CompTIA Security+ certification

Assessment

  1. Lab Exercises (25%)
  2. Case Study (3000 - 4000 words - 35%)
  3. Final Exam (45%)

Subject Availability

Session 1 (Feb), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject is designed for those in professional positions with a need to communicate effectively and manage the communication of others to a high standard. Students who undertake this subject will gain a wide breadth of practical communication skills supported by the latest intellectual and psychological behavioural theory. This subject will equip students to communicate at all levels of professional business.

MGI521 - Professional Communications will cover the following topics:

  • Communication Psychology of Knowledge Exchange
  • Business Language & Document Writing
  • Digital Communications & The Media Experience
  • Creating Business Proposals & Reports
  • Digital Presentations & Tools
  • Selling & Obtaining Buy-In
  • Facilitating Workshops & Meetings
  • Managing Business Conflict & Negotiation
  • Differences Between Leadership, Management & Mentors
  • Personal Presentations & Public Speaking

Assessment

  1. Recorded Audio Presentation (4 mins - 15%)
  2. Document Critique (35%)
  3. Presentation (500 words / 10-15 slides / 10 minute presentation - 50%)

Subject Availability

Session 1 (Feb), Session 2 (July), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
Elective Subjects (Choose 1)
ITC514
Linux Server Administration
ITC596
IT Risk Management

Abstract

This subject is designed to introduce students to systems administration of Linux servers that provide information services accessed through the internet. Students learn to operate servers via the command line, write scripts to automate management tasks, create and manage networked information services, and assess tools for improving data and service protection.

ITC514 - Linux Server Administration will cover the following topics:

  • Introduction to server administration
  • Automating system tasks
  • Data organisation
  • Data Integrity
  • Network administration
  • Network services
  • UNIX security
  • Performance analysis
  • Security management, policy and politics

Assessment

  1. Installing  Linux (10%)
  2. Assignment 2 (Quiz and practical task - 20%)
  3. Assignment 3 (Quiz and practical task - 20%)
  4. Final Exam (50%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides students with a thorough background in IT security risk management issues. Comprehensive selections of risk management techniques for IT security are covered, including quantitative and qualitative methods. Other topics include security decision-making, risk mitigation, risk transference and business continuity planning.

ITC596 - IT Risk Management will cover the following topics:

  • Information security basics.
  • Fundamental security rules.
  • Security decision making.
  • Practising security.
  • Foundations of risk management.
  • Quantitative risk assessment.
  • Qualitative risk assessment.
  • Risk mitigation.
  • Risk transference.
  • Business continuity planning.

Assessment

  1. Forum discussions (10%)
  2. Case study (25%)
  3. Case study (25%)
  4. Risk assessment report (40%).

Subject Availability

Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
Elective Industry Subjects (Choose 3)
ITE512
Incident Response
ITE513
Forensic Investigation
ITE514
Professional Systems Security
ITE516
Hacking Countermeasures

Abstract

In this subject students will investigate the current threats to systems and networks, along with effective countermeasures. Students will also be prepared for the GIAC Certified Incident Handler (GCIH) industry certification exam.

ITE512 - Incident Response will cover the following topics:

  • Computer attack methods
  • Computer attack vectors
  • Defence methods
  • Computer scanning
  • Platform and device-specific attacks and defences
  • Application-level attacks and defences
  • Incident handling processes
  • Legal issues
  • Recovery and restoration issues

Assessment

  1. Incident Response Plan (2500 words - 30%)
  2. Incident Report (2500 words - 30%)
  3. Final Exam (40%)

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

In this subject students will acquire an in-depth knowledge and practical understanding of how to scan, test, hack and secure a computer system against potential vulnerabilities. Students will also be prepared for the Computer Hacking Forensic Investigator (CHFI) industry certification exam from the EC-Council.

ITE513 - Forensic Investigation will cover the following topics:

  • Computer forensic analysis.
  • The latest computer attack vectors and how you can stop them.
  • Proactive and reactive defences for each stage of a computer attack.
  • Investigation of attacks against Windows, Unix, switches, routers and other systems.
  • Application-level vulnerabilities, attacks, and defences.
  • Legal issues in incident handling.
  • Recovering from computer attacks and restoring systems for business.

Assessment

  1. Practical Labs (20%)
  2. Forensic Essay (3500 words - 35%)
  3. Final Exam (45%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

In this subject students will analyse and apply content from the ten domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. Students in this subject will also be prepared for the Certified Information Systems Security Professional (CISSP) industry certification exam from the International Information Systems Security Certification Consortium (ISC²).

ITE514 - Professional Systems Security will cover the following topics:

  • Access Control
  • Application Development Security
  • Business Continuity and Disaster Recovery planning
  • Information Security Risk and Governance
  • Cryptography
  • Legal, Regulations, Investigations and Compliance
  • Operations Security
  • Physical (Environmental) Security
  • Security Architecture and Design
  • Telecommunications Security

Assessment

  1. Access Control Policy (2000 15%)
  2. Incident Analysis (3000 words - 35%)
  3. Final Exam (50%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

In this subject students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.

ITE516 - Hacking Countermeasures will cover the following topics:

  • Footprinting, Scanning and Enumeration.
  • Penetration Testing, System Hacking, Session Hacking and Linux Hacking.
  • Trojans, Back Doors, Viruses and Worms.
  • Sniffers.
  • Denial of Service.
  • Social Engineering.
  • Hacking networks and exploiting vulnerabilities.
  • SQL Injections.
  • Physical Security.
  • Evading IDS, Firewalls and Honeypots.
  • Buffer Overflows.
  • Cryptography.

Assessment

  1. Lab Task 1 (15%)
  2. Lab Task 2 (15%)
  3. Social Engineering Essay (25%)
  4. Final Exam (45%)

Subject Availability

Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
Graduate Certificate in Information Systems Security
The Master of Information Systems Security is an articulated course that incorporates the Graduate Certificate in Information Systems Security. The certificate can be stand alone or, upon successful completion, students may proceed (with full credit) into the Master of Information Systems Security.  To graduate with the Graduate Certificate, students must satisfactorily complete the following four core subjects:

  • ITC506 Topics in IT Ethics
  • ITC595 Information Security
  • ITI581 Network Security Fundamentals
  • MGI521 Professional Communications

Credit
Academic credit is available to students who can provide proof they have passed relevant industry certification examinations. Prospective students can obtain an estimate of credit entitlements from Industry Examinations by filling out the Credit Eligibility Form. NOTE: The actual level of credit awarded will be confirmed upon acceptance into the Degree.

Information session
A recorded information session about the Master of Information Systems Security can be viewed below.