There is a more recent version of this academic item available.

Overview

Our Associate Degree of Cybersecurity opens doors to one of the most rapidly expanding global industries. Cybercrime is now a widespread threat and a mainstream concern that can only be combated by highly-skilled specialists - not IT professionals alone. La Trobe's Cybersecurity degree addresses the global shortage of cybersecurity professionals … For more content click the Read more button below. You'll cover the history of hacking and explore the various methods used to defend and protect against malicious cyber-threats. As cybersecurity is as much about people as it is about technology, you'll also learn about the sophisticated techniques that cyber-criminals use to manipulate individuals to access confidential information online.

Portfolio

Office of the Provost

Course coordinator

Kayes Kayes

Location(s)

Melbourne (Bundoora)

CRICOS code

106834K

Course instance contact

Kayes Kayes

Course duration (full time)

2 years

Study level

Sub-degree

AQF level

Level 6 - Associate Degree

Available only as an exit award

Yes

Study options

Domestic

International onshore

Completion requirements

To qualify for the award of Associate Degree in Cybersecurity, students must complete 240 credit points
consisting of:

165 core credit points
75 elective credit points

Course intended learning outcomes

On successful completion you will be able to:
1.
Justify and apply current and emerging cybersecurity practices, regulations and standards
2.
Apply knowledge and skills to safeguard data, systems and networks
3.
Employ professional skills and practice including effective team building, negotiation and communication across a range of environments
4.
Apply reflective and ethical awareness of human factors to develop effective policies that protect against cyber threats
5.
Conceptualise effective and innovative solutions and risk management strategies to address real work problems in cybersecurity

Career outcomes

After graduation, you could work across a range of industries, including technology, communications, education, finance, government, defence, healthcare, and energy and resources.

Possible roles include:

  • Ethical hacker
    • Bypass system and network infrastructure to safely expose weaknesses that could be exploited by a malicious hacker.
  • Cryptographer/cryptanalyst
    • Develop security systems using algorithms and ciphers to encrypt sensitive data. Analyse and decrypt information contained within cypher texts and encrypted data.
  • Security architect
    • Plan, implement and supervise computer and network security systems to protect against cybercriminals.
  • Cybersecurity policy adviser
    • Understand and articulate complex business needs to develop and implement tailored cybersecurity policies.
  • Sortware developer
    • Design, test and develop software to meet user needs. Write code for programs and applications that can adapt and respond to evolving online threats

Internal course relationships

Nested

Bachelor of Cybersecurity

Bachelor of Cybersecurity/Bachelor of Commerce

Bachelor of Cybersecurity/Bachelor of Psychological Science

Diploma of Information Technology