Graduates of this degree hold a qualification that is professionally accredited by the Australian Computer Society. Your major in Networking and Cybersecurity will see you studying areas such as:
- systems administration and design
- network architecture and security
- CCNP route, switch and troubleshoot
- digital forensics and electronic discovery
- cloud, virtualisation and storage
The networking courses in this degree prepare you to sit industry certification exams in CISCO, CCNA and CCNP. This means that you could hold a highly regarded industry certification as well. You will learn through exposure to the real working world, and from the very latest in research developments and technologies. You’ll have opportunities for industry placements, internships and research projects with industry partners.
Your career
The cybersecurity field is flourishing and the need for specialists is increasing.
In April 2016, the Australian government launched a $230m Cyber Security Strategy with 33 initiatives aimed at improving defences and creating a 'cyber smart nation'. It addresses our nation’s "shortage of cyber security professionals" and states that we must "build our nation’s stock of cyber security skills, which are becoming increasingly essential for life and work in our connected world". Careers to consider:
network administrator: supporting infrastructure for wired network connections, wireless access points and remotely connected users; ensuring continuous network operations; performing installation, configuration, maintenance, upgrade, documentation, and operational support of network equipment
IT cybersecurity: specialist understanding vulnerabilities and threats; performing threat and risk assessments, and mitigation strategies; developing network system architecture and design; auditing, acceptance testing and compliance; ability to work in a close team
network engineer: designing and implementing networks and network security; understanding of security tools like cloud security, malware detection, web application firewalls, intrusion prevention; technical security risk assessment; writing security procedures and documentation