Cyber Security

Bachelor of Computing (Cyber Security) 

(N/481/6/0823)(03/25)(MQA/PSA 13760)

Location Perth and Malaysia
Study Method Full-time
Study Mode On-Campus
Intake February or July
Duration 3 Years

ENQUIRE NOW   HOW TO APPLY   HANDBOOK

About Cyber Security

Cyber security encompasses technologies, processes and practices designed to protect networks, computers, programmes and data from attack, damage or unauthorised access.

This course provides the skills and knowledge graduates need for a successful career in the rapidly evolving information and communications technology industry related to cyber security.

The Cyber Security course focuses on the key concepts and challenges in data and resource protection and computer software security. Students will examine the high level (cryptography theory, data access policy development and security program management) and low level (computer forensics, network intrusion detection and incident handling) practical aspects of computer security.

They will also develop skills in identifying appropriate applications for specific scenarios, with an understanding of cultural and ethical issues related to protecting individual rights.



Application Note:

Majors must be specified if student applies for CRL:
1) Computer Science
2) Cyber Security
3) Software Engineering

open all +

Minimum English language entry requirements

ENGLISH QUALIFICATION SCORE
International English
Language Testing System (IELTS)

Overall 6.0
(no individual band below 6.0)

(L6, R6, W6, S6)

Test of English as a
Foreign Language (TOEFL)
68 (band minimum W-21,
L-13, R-13, S-18)
SPM 1119 English C
GCE ‘A’ Level E
GCE ‘O’ Level C

Cut-off scores

QUALIFICATIONS SCORE
GCE-A Level/ STPM/ (best of 3 subjects) 8
A-Level Forecast 10
UEC (best of 5 selected subjects) 20
HKDSE 18
IB 28
IB Forecast 30
Ontario Gr 70%
ATAR (WACE/ SACE/ HSC/ VCE/ AUSMAT/ SAM/ MUFY) 80
WAUFP (CPS) 59
India/ Pakistan (CBSE) 70%
India/ Pakistan (HSC) 71%
Sri Lanka 8

Cut-off scores key:

GCE : General Certificate of Education
STPM : Sijil Tinggi Persekolahan Malaysia
IB : International Baccalaureate
ATAR : Australian Tertiary Admission Rank – applicable to all Australian matriculation
HKDSE : Hong Kong Diploma of Secondary Education
India : Includes All India Senior School Certificate awarded by The Central Board of Secondary School Education (CBSE), Indian School Certificate (ISC) awarded by the Council for the Indian School Certificate Examinations (CISCE), Higher School Certificate (HSC) awarded by one of the State Secondary School Boards. Certificates awarded by the CBSE and the CISCE are generally considered to represent a higher level of achievement than state certificates.
Sri Lanka : GCE ‘A’ level issued by the Department of Examinations

Score Conversion for Advanced level/GCE/GCSE:
Grades awarded from 2010 onwards: A*=6, A=5, B=4, C=3, D=2, E=1
Grades awarded up to 2009: A=5, B=4, C=3, D=2, E=1
AS Levels equal half of that of an Advanced Level, e.g. 3 points for an A*, 2.5 points for an A (prior to 2010)

Subject Grades Conversion for STPM : A=5, A- =4, B+ =4, B=3, B- =2, C+ = 2, C=1
The following UEC subjects are included in the aggregate of best five subject:
• Mathematics • Advance Mathematics I • Advance Mathematics II • Biology • Chemistry • Physics • Business Studies • Bookkeeping and Accounts • Accounting
• Economics • History • Geography • Computing and Information Technology

Note: Scores for individual prerequisites may be taken into consideration for assessment purposes.

Course Prerequisites

Mathematics.

CRL requirement

It is essential to nominate a major for CRL assessment. A syllabus must also be provided.

 

Applicants with lower ATAR or no Calculus can be recommended the Bachelor of Information Technology

• Malaysian Qualifications Agency (MQA)
• Australian Computer Society

Diploma applications will be treated on case to case basis.

• Cyber security analyst
• Forensic computer analyst
• Software developer
• IT analyst
• Web application developer

Cyber Security 

Normal Intake (March/July)

YEAR 1 SEMESTER 1|
Programming Design and Implementation
Introduction to Software Engineering
Fundamental Concepts of Data Security
Integrating Indigenous Science and STEM

YEAR 1 SEMESTER 2
Unix and C Programming
Data Structures and Algorithms
Linear Algebra and Statistics for Engineers
Database Systems

YEAR 2 SEMESTER 1
Computer Communications
Operating Systems
Fundamental Concepts of Cryptography
Unix Systems Programming

YEAR 2 SEMESTER 2
Computing Topics
Cyber Crime and Security Enhanced Programming
Cyber Security Concepts
Elective Units*

YEAR 3 SEMESTER 1
Mobile Cloud Computing
Machine Learning
Capstone Computing Project 1
Elective Units**

YEAR 3 SEMESTER 2
Capstone Computing Project 2
Penetration Testing and Defence
Cyber Security – Intrusion Detection System and Incident Handling
Elective Units***

ELECTIVE UNITS

Elective Units*

  • Requirements Engineering
  • Computer Systems
  • Mobile Application Development
  • Software Engineering Concepts

Elective Units**

  • Object Oriented Software Engineering
  • Design and Analysis of Algorithms
  • Software Engineering Testing
  • Human Computer Interface

Elective Units***

  • Requirements Engineering
  • Computer Systems
  • Mobile Application Development
  • Software Engineering Concept

Mid-year Intake (March/July)

YEAR 1 SEMESTER 1
Programming Design and Implementation
Linear Algebra and Statistics for Engineers
Database Systems
Computer Systems

YEAR 1 SEMESTER 2
Unix and C Programming
Data Structures and Algorithms
Introduction to Software Engineering
Integrating Indigenous Science and STEM

YEAR 2 SEMESTER 1
Computer Communications
Cyber Security Concepts
Elective Units (Select the following 2 units to the total value of 50 credits)

  • Requirements Engineering
  • Mobile Application Development

YEAR 2 SEMESTER 2
Capstone Computing Project 1
Unix Systems Programming
Operating Systems
Fundamental Concepts of Data Security

YEAR 3 SEMESTER 1
Computing Topics
Penetration Testing and Defence
Cyber Security – Intrusion Detection System and Incident Handling
Cyber Crime and Security Enhanced Programming

YEAR 3 SEMESTER 2
Capstone Computing Project 2
Mobile Cloud Computing
Machine Learning
Fundamental Concepts of Cryptography

Please refer to the handbook for additional course overview information.

Click on the link below to view the Fees and Charges for the offered course.

Fees & Charges