APPLY

This website stores cookies on your computer. These cookies are used to improve your website and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy

Cyber Security

Programme
Harbour.Space students gain knowledge of the most sophisticated encryption methods and threat detection techniques under the capable leadership of cyber security giant Kaspersky Lab.

Programme overview

  • 3 years
  • Full-time Duration
  • 19 900 EUR Tuition Fee/Year
  • 180 ECTS ECTS
  • English Language of Instruction
  • All Year Round Application Period

As enterprise is becoming focused on the security of its information systems, the demand for cybersecurity specialists continues to expand.  The Bsc in Cybersecurity prepares students to handle the full variety of threats and challenges faced by the modern enterprise. Students start with foundations in mathematics and computer science, continue with programming and security tools and arrive at the understanding of the full range of current cyber threats, enterprise security architecture as well as legal and ethical aspects of security.

See full curriculum Programme structure
1
year

In the first year, students obtain the foundational theoretical knowledge they need to become cybersecurity professionals. The programme builds the mathematical basis upon which students will develop understanding of programming, computer networks and enterprise information systems during following years. The courses are mostly given in a form of lectures and takeaway coursework.

Modules
  • Combinatorics & Graphs - 1
  • Foundations of programming – 1
  • Calculus – 1
  • Foundations of mathematical logic
  • Linear algebra -1
  • Data structures and algorithms – 1
  • Combinatorics and graphs – 2
  • Calculus – 2
  • Data structures and algorithms – 2
  • Linear algebra – 2
  • Computer Organisation and Systems
  • Combinatorics
  • Operating systems
  • Calculus – 3
  • Captstone Project
  • Seminars & Workshops
More
2
year

In the second year, students complete the foundations with courses in programming, scripting, machine learning and databases and continue to study security of operating systems and networks. The second year also offers a fundamental courses in cryptography and principles of secure programming. Most courses require practical coursework and a course project enabling students to get a feel for the challenges and approaches used in this field. The students will also begin developing software for the Capstone project.

Modules
  • Probability theory
  • Introduction to Statistics
  • Java
  • Practical Unix
  • Parallel and Disrtibuted Computing - 1
  • Introduction to Cyber Security
  • Machine learning – 1
  • Secure Programming
  • Compilers
  • Introduction to Computer Networking
  • Database Systems Principles
  • Windows Administration
  • Introduction to Cryptography
  • Scripting Languages
  • Web Applications
  • Captstone Project
  • Seminars & Workshops
More
3
year

During the third, the final year, students focus on veriety of cybersecurity topics including advanced network management, operating system security, policy analysis and implementation, vulnerability analysis and legal environment. The courses are taught by researchers and professionals who practice the material they teach either academically or professionally. This is the best time to learn cybersecurity first hand from leading practitioners. The goal of the final year is to expose students to a range of real-world security challenges and mitigation strategies and to ensure seamless transition into a professional roles.

Modules
  • Linux Administration
  • Human Aspects of Cybersecurity: Law, Ethics and Privacy
  • Disaster Recovery
  • Advanced Network Management & Security
  • Operating Systems Security
  • Policy Analysis and Implementation
  • Enterprise Information Systems & Clouds
  • Ethical Hacking
  • Risk Management
  • Vulnerability Analysis, Penetration Testing
  • Data Visualization
  • Mobile Application Development
  • Technical Project Management
  • Performance Oriented Computing
  • Computer Forensics
  • Software Testing, Verification and Validation
  • Leadership & Group Dynamics
  • Writing, Documentation, TeX, JavaDoc, Academic
  • Captstone Project
  • Seminars & Workshops
More
  • 2 years
  • Full-time Duration
  • 22 900 EUR Tuition Fee/Year
  • 90 ECTS ECTS
  • English Language of Instruction
  • All Year Round Application Period

The MSc programme is designed for those who want to extend their technical and programming skills to handling enterprise security challenges. Our comprehensive courses will provide a solid foundation in key technology including computer and network security, cryptography, enterprise security architecture analysis, etc.  The graduates will learn to stay current on rapidly changing technology, adapt and control to new threats and start a successful career in enterprise security.

See full curriculum Programme structure
1
year

During the first year students quickly recap basics of computer science and then focus on fundamentals of cybersecurity including computer architecture, operating systems security, secure programming, networks, and cryptography.

Modules
  • Computer Architecture
  • Secure Programming
  • Algorithms and Data Structures
  • Practical Unix
  • Windows Administration
  • Operating Systems
  • Computer Networking
  • Human Aspects of Cybersecurity: Law, Ethics and Privacy
  • Cryptography
  • Software Engineering & Design
  • Scripting Languages
  • Java Programming
  • Identity and Access Management
  • Technical Writing and Presenting
  • Introduction to Interaction Design
  • Leadership and Group Dynamics
  • Secure Data management
  • Captstone Project
  • Seminars & Workshops
More
2
year

The second year exposes students to different dimensions of cybersecurity field. Subjects range from Mobile and Cloud Security to Digital Forensics and Quantum Communication and Cryptography. Additionally students participate in communication and leadership modules preparing them for the career as a successful member of a professional team. At the end of the programme, graduates will be ready to take on responsibilities to safeguard an organization’s information and technology assets.

Modules
  • Technical Project Management
  • Application Security
  • Mobile Security
  • Network Security
  • Enterprise Security Architecture and Design
  • Software Testing
  • Reverse Software Engineering
  • Vulnerability Analysis, Penetration Testing, Intrusion Detection and Incident Handling
  • Ethical Hacking and Response
  • Cyber Warfare
  • Security Tools for Information Security
  • Digital Forensics
  • Quantum Communication and Cryptography
  • Parallel and Distributed Computing
  • Cloud Computing
  • Advanced computer networks
  • Distributed Databases
  • Global Cyber Capabilities and Trends
  • Enterprise Security Threats
  • Enterprise Security Case Studies
  • Economics of Security
  • Cyber Risk Management
More

Faculty Cyber Security

We're delighted to introduce some of our excellent teachers. Keep track of more news about who's coming to share their expertise at Harbour.Space on our Twitter and Facebook.

Programme leadership

Richard Buckland
PhD,Chair of the Academic Board of the Australian Computer Society Education, Member of UNSW Academic Board

Professor Richard Buckland has the global audience reach of a rock star, counting over 2 million views of his online computer science lectures on MOOC (Massive Online Open Courses). He is co-founder of education start-up openlearning.com - an open MOOC that integrates social media features into higher education, and he teaches Computer Security, Cyber Crime and Cyber Terror at the University of New South Wales alongside his Faculty Leadership at Harbour.Space.

Richard’s research areas are in Learning and Teaching and Security Engineering. He’s currently working on protocols for secure electronic elections in untrusted environments. He is Chair of the Academic Board of the Australian Computer Society Education, a member of the UNSW Academic Board, the Director of First Year Studies and the Chair of the Skills Syllabus Group of the School of Computer Science and Engineering at UNSW. He was named the 2013 Australian ICT Educator of the Year by the iAwards – a national programme recognising innovation and leadership across the ICT industry. He has been awarded the University Medal in Computer Science and the Vice Chancellors Award for Teaching Excellence, as well as numerous teaching awards from the Australian College of Educators, the Australasian Association of Engineering Educators and the Australian Learning and Teaching Council. Richard has a passionate belief in the importance of education, learning and thinking in a broad sense. He has a particular interest in exceptionally gifted students and students with learning difficulties.

More

Career path projection

  • Junior security engineer 
    Junior security engineer conducts incident/event investigation analysis and tests security products and systems to detect security weaknesses.
  • Security Engineer
    Security Engineer builds and maintain IT security solutions for an organisation, develops technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. 
  • Security Director
    Security Director oversees the implementation of all IT security measures throughout an organisation required to ensure the security of equipment, information, and personnel from fraud, internet hacking, physical assault, industrial espionage, terrorism or robbery.
  • Security Architect
    Security Architect creates complex security structures and thinks like a hacker would, because he/she must anticipate all of the moves and tactics that hackers will use to try and gain unauthorized access to the computer system. 
  • Chief Information Security Officer (CISO)
    A Chief Information Security Officer (CISO) establishes and maintains the enterprise vision, strategy and programmes to ensure information assets and technologies are adequately protected. 
  • There are two types of companies: those who have been hacked, and those who don't yet know they have been hacked.
  • As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace.
  • Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.

Apply for 2017-2018

Go to Admissions
FAQ
Leave your e-mail
And we addition will send you a link to the programme, so you will not lose it

No, thanks
Request a call
If you are thinking to apply to Harbour.Space university just get in touch. We'd love to talk.

Thank you!
We call soon
Keep an eye out for an activation email in your inbox. Once you’ve followed the link in our email.
Done
Request free information about Harbour.Space
1 minute to complete and fast response time

Thank you!
We call soon
Keep an eye out for an activation email in your inbox. Once you’ve followed the link in our email.
Done
Request free information about Harbour.Space
1 minute to complete and fast response time

Thank you!
We call soon
Keep an eye out for an activation email in your inbox. Once you’ve followed the link in our email.
Done