-
95% graduates employed
-
Top 10 Catholic universities globally
-
Top 40 young universities worldwide
Graduate Certificate in Cyber Security
Course information for - 2025 entry
Offered at 0 locations
- Duration
Overview
Cyber security plays a vital role in our networked global infrastructure. This course covers the theoretical foundations and concepts needed to understand the security issues faced by network environments and the importance of data stewardship.
The industry and research-based projects offered by this Microsoft-certified (Microsoft Azure Data Fundamentals) program give you a global perspective and make you work-ready. All our units are embedded with the United Nations sustainable goals. This program is co-designed with CISCO Networking Academy and offers free access to CISCO NetAcad resources. You can use this graduate certificate as a pathway to further expand your knowledge by completing a Master of Information Technology. Units from this course can also count towards a cyber security specialisation in the MBA.
We also offer the course fully online so you can study anywhere, anytime to suit your schedule. ACU Online
Careers
Our graduates have pursued careers as:
- security software developer
- security consultant
- information security analyst
- IT security consultant
- security systems administrator
- network engineer
- cyber security manager
Industry partnerships
This program is co-designed with CISCO Networking Academy.
Microsoft certifications are embedded into this program.
Microsoft Certification helps you:
- Get recognised. Build confidence and be recognised as a leader, unlock new opportunities, and share your credentials with your professional network.
- Get ahead. Stay ahead of the curve, increase your productivity, and take your career to the next level.
- Get hired. Certified technical skills help you prepare for job opportunities by proving to employers you have the skills they want.
Course details
Course structure
To complete the Graduate Certificate in Cyber Security, a student must complete 40 credit points (cp).
Course map
Graduate statement
AQF framework
Staff Profile
Dr Walayat Hussain
Head of Discipline of Information Technology, Peter Faber Business School.
Dr Walayat Hussain is currently the Head of the Discipline of Information Technology at Peter Faber Business School. He has an academic and industry experience of more than 17 years. Before joining the ACU, he was a Lecturer at Victoria University Melbourne, lecturer and a Post-doctoral Research Fellow at the University of Technology Sydney for seven years. He worked as an Assistant Professor and postgraduate program coordinator at the department of Computer Science at BUITEMS University for many years. He holds a PhD, Master, Postgraduate Diploma, and Bachelor's (Hons.) degrees in Computing and Information Systems from the UTS, AIT, BUITEMS, and Hamdard University.
Walayat has developed and revitalised multiple postgraduate and undergraduate subjects of Information Systems and has taught more than 30 subjects to undergraduate and postgraduate students. He has supervised several research students as the principal and co-supervisor to completion. Walayat's research areas are Service Computing, Business Intelligence, AI, Information Systems, Computational Intelligence, Machine Learning, and Decision Support Systems. He has contributed to theory and application and developed a new approach for making an optimal informed decision in complex systems. He has published more than 74 high-quality research documents.
Dr Kamanashis Biswas
Lecturer, Peter Faber Business School
Dr Kamanashis Biswas is a Lecturer in Information Technology at Peter Faber Business School. He is also an adjunct lecturer at School of ICT, Griffith University. Before starting his role at ACU, he worked as an Associate Lecturer at Griffith University for one and half years. He also worked as a faculty at Daffodil International University, Bangladesh for about four and half years. His research interests include blockchain technology, design and development of lightweight security protocols, energy efficient and secure routing, intrusion detection systems, security issues in MANETs and WSNs. He has published more than 50 peer reviewed papers in various journals and conferences including IEEE, ACM, Springer and Elsevier.