Outline
Outline
Businesses today increasingly seek the expertise of information security professionals. They require experts who can evaluate organisational security measures, and develop and recommend security measures to safeguard critical assets.
In this Master of Information Systems and Technology specialisation, you’ll learn how to analyse, design and implement robust security measures across diverse computer systems and networks.
You’ll develop the skills to evaluate and counteract emerging cyber threats. You'll learn about the threat landscape and common attack vectors, and use cutting-edge tools to detect, prevent and mitigate attacks.
You will also craft effective security policies and procedures that meet industry standards and legal requirements, and learn how to foster a culture of security awareness and accountability among users, IT staff and management.
To complete the course, you’ll conduct a formal cybersecurity audit on a real-world business and present information security recommendations. You can also gain real-world experience and global exposure by completing an internship or international study tour.
Please refer to the Curtin Handbook for details about the course structure.
What jobs can the Information Security specialisation lead to?
Careers
- Information security analyst
- Cybersecurity analyst
- Security operations centre (SOC) analyst
- IT risk and security analyst
What you'll learn
- analyze, design, and implement effective security measures for various types of computer systems, networks, and information systems, applying knowledge of threat models, security protocols, and best practices in the field, GC1, GC4.
- evaluate and respond to emerging threats and vulnerabilities in information systems, by applying a deep understanding of the threat landscape, including common attack vectors, and by utilizing tools and techniques to detect, prevent, and mitigate attacks, GC1, GC4, GC5.
- develop and communicate effective security policies, guidelines, and procedures that comply with industry standards and legal requirements, and that promote a culture of security awareness and accountability among stakeholders, including users, IT staff, and management, GC2, GC3, GC5, GC6.