Skip to main content
I’m interested in…

Master of Cyber Security Online


2 years part-time



Start date

30th August

Study mode


  1. Lay the groundwork for an exciting future as a cyber security leader by gaining best-in-class technical and managerial skills. Download a brochure now.
  2. We rank #2 for Computer Science and #1 for Electronic Engineering, two disciplines at the core of cyber security*. 
  3. Our graduates are the most employable out of all South Australian universities**. Check out the program entry requirementsfees and pathway options details below.   
business icon

High-impact career move

Our program covers all the technical and managerial skills you’ll need to forge your own career path as a senior cyber security specialist.

security icon

Hands-on technical training

Hone your cyber defence skills through experiencing real-world scenarios and the best software and network defence strategies

graduate icon

Protect any environment

Keep your options open and graduate with the ability to work in either the public or private sector.

technology icon

Drive future innovation

Contribute towards an area at the cutting-edge of cyber security through an industry-based research project.

handshake icon

Industry based curriculum

Our program coordinators enrich their teaching and curriculum 
with their experience of today’s complex environment.


Reputation enhancing

Studying with a Group of Eight university ranked in the top 1% worldwide*** guarantees an exceptional quality of learning and industry recognition.

Experience real-world cyber security tools

Hackathon logo

Missing Persons Hackathon

Join a University of Adelaide team and use real intelligence and potential leads for up to 12 missing persons cases during the six-hour event.

cyber collaboration centre logo

Events and training

Attend training and networking events organised by the Australian Cyber Collaboration Centre (A3C) partnership in Adelaide or online.

Kali Linux logo

Kali Linux

Experience using the most popular security Linux distribution that comes pre-loaded with many security assessment and computer forensics tools.

the university of Adelaide logo

Virtual Hack Lab

Connect to our Virtual Hack Lab environment via an OpenVPN client installed by default on Kali Linux.

Hack the box logo

Online penetration testing environments

Use various online platforms (like HackInBox) to test and advance your skills in penetration testing and cyber security.

cyber security challenge logo

Cyber Security Challenge Australia (CySCA)

Participate in CySCA, a “hacking” competition run by a partnership between the Australian Government, business and academic professionals.   


Flexible online learning 

Studying online gives you the flexibility to study on your terms. Most of our students continue working full time and complete the coursework whenever suits them. The innovative online learning platform is easy to use and has all the resources you will need to complete your degree. Find out more in our program brochure

What should I expect?:  

  • six week teaching periods with at least a two-week break in between
  • between 20 to 25 hours of coursework per week 
  • weekly interactive webinar debates and discussions to ask questions and deepen your knowledge 
  • technical activities using real-world tools 
  • weekly quiz on key concepts, terminology and readings  
  • discussion forums with interesting case studies and tips from your peers 
  • course readings and guided research 
  • three assessments over the six weeks. 

What will my assignments be? All assessments and coursework are 100% online. Assessments will including knowledge quizzes, peer-reviewed discussions, ePortfolios, short essays, short videos, reports and reflective tasks.


What skills will I gain?   

The Master of Cyber Security online will give you the skills to take on senior roles at a wide range of organisations. On successful completion of this program, you will be able to: 

  1. demonstrate knowledge and understanding of the technical practice, management and policy implications of cyber security and its application within complex industry contexts 
  2. apply, evaluate and use the principles of cyber security within real-world contexts 
  3. critically seek, analyse and evaluate data, materials and technology to construct professional advice relating to the technical practice, management and policy of cyber security 
  4. adopt and employ professional attitudes, standards and values 
  5. use highly effective interpersonal skills to enable empathetic and effective communication with a range of audiences.  

Apply now and receive a response to your application in as soon as 3 days. Alternatively, download the brochure to see if this program is right for you.

A trusted partner of the Australian Government  

The Federal Government has appointed the University of Adelaide as a key member of the Australian Cyber Security Centre (ACSC) to make Australia the most secure place to connect online. The university joins some of the brightest minds from across the country to contribute specialised capabilities and drive innovation through research. 

Defend the digital frontline 

“Our program goes beyond the theory - and through hands-on and authentic technical training - empowers you to stay one step ahead.” - Professor Debi Ashenden, Cyber Security Online Program Coordinator 


*Academic Ranking of World Universities 2020 

**QS Graduate Employability Ranking 2020 

***Times Higher Education Rankings 2020 


Career opportunities  

The demand for skilled cyber security specialists has never been higher in Australia. The government, healthcare and private sectors are urgently seeking qualified professionals to take up leadership positions within their organisations. Below are the three broad categories of cyber security roles in the workplace today, all of which you will be qualified to undertake upon graduation from our online Master of Cyber Security.  

yber security management

Cyber security management

Cyber Security managers are responsible for liasing with the executive staff of an organisation and embedding policies and risk awareness.
As the manager of a group of cyber security specialists, it’s up to you to ensure you have the right skills in your team and effectively manage their time and effort.

Technicians and compliance

Technician and compliance

Cyber security technicians are the experts who directly respond incidents. You will spend your day scripting,monitoring and investigating issues using your strong technical skills. Compliance staff ensure systems and designs meet governance and management standards.

Strategy and architecture

Strategy and architecture

Strategists and architects are responsible for formulating strategies and controls to mitigate future cyber security incidents. You must be forward-thinking in these roles and have your finger on the pulse to pre-empt new developments.Your days will be spent designing roadmaps and interfacing with other technical teams.

  • Business data and cyber security - COMMGMT 7203OL

    Business Data and Cyber Security will prepare future professionals for negotiating the constantly changing use of data and information in a business world that requires constant cyber security awareness and vigilance. Value and vulnerability of business data for decision making and problem solving are a core focus. Information and cyber security awareness and methods are embedded throughout. Graduates of this course will have the skills required to apply cyber secure practices to their use of business data; and analyse and communicate business information needs. 

  • Political institutions and policy-making* - POLIS 7024OL

    This course provides a general introduction to policy making principles and processes for postgraduate students. The course primarily uses national case studies but provides comparisons to other states as appropriate. The aim of the course is to provide the political context in which debates about cyber security and other international relations issues takes place. The course utilises a number of approaches to public policy and administration so that students emerge from the course with knowledge about decision-making processes but also the assumptions and constraints which guide those decisions. We cover the main political actors, problem definition, agenda-setting, communication, institutional decision-making, and policy implementation and review. 

    *only for students with programming experience. More information can be found in the entry requirements section. 

  • Cyber security fundamentals - COMP SCI 7308OL

    In this course, students will be introduced to real-world cyber security challenges that organisations face and learn to apply knowledge and skills to address them. The challenges will be examined both from the attacker's perspective (how systems are exploited) and the defender's perspective (how to secure systems or respond to threats). Common attack and defence strategies for software, web applications, networks, operating systems, cryptographic systems and humans will be explored. The course will also introduce cyber security management concepts, including security operations, risk management, security engineering and security architecture, as well as provide guidance on different career paths specialising in cyber security. 

  • Information risks, threats and controls - COMMGMT 7025OL

    The course Information Risks, Threats, and Controls consider a broad perspective of organisational vulnerabilities of the digital age, including Enterprise Risk Assessment and critical enterprise threats. Topics addressed include recognition, analysis, and synthesis of risks, threats, and vulnerabilities, and measures to mitigate them, including policy, control, and implementation. While this course acknowledges the need to recognise and analyse risks, threats, and vulnerabilities across and within the various disciplinary structures of an organisation, (including fiscal risk, brand and reputation, production, operations, legal, and OH&S) it does so from the perspective of the responsibility for Information and Cyber Security plans to support and ensure the risk management of other departments and disciplines. The focus, throughout, is specifically on Information and Cyber Security and Data Privacy. 

  • Secure programming - COMP SCI 7307OL

    The purpose of the course is to learn about secure software, including its design, implementation and maintenance. During the course students will be exposed to a selection of topics such as: performing threat modelling, issues in authentication and authorisation, auditing for security, input sanitising, TOCTOU vulnerabilities, memory management issues, fixing vulnerabilities, and microarchitectural security. 

  • Human and ethical factors in computer science - COMP SCI 7212OL

    In this course, students will be introduced to two important areas in contemporary computing: human factors and ethical theory and practice. In human factors, students will study all areas that assist in performing work in an appropriate manner. In ethics, students will study those areas that discuss whether the tasks that we seek to achieve fit our definitions of what is right for individuals, companies, and our society. By combining these two areas of study, participants will be introduced to tools, thinking, and analyses to establish whether the computing tasks they are being asked to perform are fit for purpose in terms of both usage and ethics. At the end of this course, students will have a sound understanding of key issues in ethics and human factors, be able to compare approaches and propose solutions, and have participated in a number of authentic activities to give them confidence as future professional practitioners in this sphere.

  • Research methods in software engineering and computer science - COMP SCI 7405OL

    This course will prepare students for advanced research by examining how to plan, conduct and report on empirical investigations. The course will cover techniques applicable to each of the steps of a research project, including formulating research questions, theory building, data analysis (using both qualitative and quantitative methods), building evidence, assessing validity, and publishing. It will particularly focus on research involving software, developing statistical tools to measure software performance and the ways in which people interact with software tools.

  • Applied privacy - COMP SCI 7213OL

    This course will cover the latest privacy techniques and practices that enterprises and governments have adopted. Students will gain a deep understanding of what the risks to human related privacy are and will be encouraged to rethink how to design and build products and systems with privacy and respect for their users across countries in which they may operate. The course will also introduce the concept of pure provable privacy -- differential privacy -- and show how it is being put into practice. Differential privacy was initially incepted at Microsoft Research, and the theoretical and technical impact of differential privacy is profound in global industries, which has already been deployed by Google, Apple, Uber, and US Census Bureau. Finally, the course will show ways of achieving differentially private mechanisms through a practical translation and explore the limits of the use of differentially private techniques in synthetic data generation by demonstrating practical attacks that thwart privacy properties. 

  • Human-centred security - COMP SCI 7214OL

    The Human-Centred Security course will expand students’ understanding of cyber security beyond the sphere of technology by addressing the role human behaviour plays in securing and subverting systems.  The course takes a transdisciplinary approach combining academic research from a range of disciplines (such as computer science, psychology, international relations and political science) with practitioner experience, to explore ways of creating solutions to complex cyber security problems.  The course is grounded in security theory so that students can develop an understanding of what it means to be cybersecure as an individual, as a society and as a nation state. Students will explore the relationships between people and technology from the perspective of users, designers and developers of technology, as well as policy makers.     

    At a practical level, students will learn how to evaluate tools to understand and shape cyber security behaviours.  They will be able to generate ways of conducting transdisciplinary research to design solutions to complex cyber security problems.  Students will develop expertise that enables them to critique cyber security strategies and policies and generate productive security dialogues across communities.

  • Business information systems and management - COMMGMT 7024OL

    Business Information Systems and Management covers the critical aspects of information management and information systems needed in all businesses in the 21st century. The overarching focus of the course is the ability to leverage technology for business and enterprise purposes. This is managed through a three-fold focus: there is a strong emphasis on systems thinking and systems analysis for managing complexity; and an equal emphasis on the role of systems and computing for organisational need and practice. The third focus is on the ability to manage effective liaison and communication between business staff and IT departments and personnel. 

  • Research project - CYBER 7103AOL and CYBER 7103BOL

    Students will undertake an individual applied research project based within a workplace or industry context.  

    This is an advanced research project conducted individually under the guidance of an academic supervisor. It gives students the chance to investigate and contribute to an area at the cutting edge of cyber security. As part of the project, students will present their work to an audience and write a major report detailing their results. 

    Please note this course is taught over two teaching periods. 

Academic entry requirements

To be eligible for the Graduate Certificate, Graduate Diploma or Master of Cyber Security, you need to meet one of the following requirements: 

  1. Bachelor of Computer Science (or an equivalent Information Technology degree) and a GPA of 4.5  


  1. relevant work experience of at least 3 years in Computer Science or Cyber Security roles  


  1. diploma or above in networking and IT plus 2 years relevant work experience. 

Don’t have programming experience? 

To excel in the applied nature of our cyber security postgraduate programs, all our students require some experience with a programming language. If you don’t have this experience, we offer the course Foundations of Computer Science – Python A (COMP SCI 7210OL) in place of Political Institutions and Policy-Making (POLIS 7024OL). Our friendly admissions team will guide you through the enrolment process once your application has been accepted. 

This course will develop your coding and problem-solving skills with a focus on data and data science. You will learn algorithm design as well as fundamental programming concepts such as data, selection, iteration and functional decomposition, data abstraction and organisation. You will build fundamental software development skills including the use of the Python programming language and tools, debugging, testing and fundamentals of good programming practice, style and design. 

English language requirements  

In order to study with the University of Adelaide, you must be proficient in speaking, listening, reading and writing in English as this is the language of instruction. You must be able to demonstrate that you meet the Minimum English Language Requirements, however, you will not be required to provide evidence of English language proficiency if you are an Australian citizen or hold a passport from one of the following countries: Canada (English speaking provinces only), New Zealand, the Republic of Ireland, the United Kingdom and the United States. If English is not your first language of instruction, further documentary evidence will be required so please check the detailed Minimum English Language Requirements document for information about acceptable English language tests.  

What is the total cost?

The total cost of the online Master of Cyber Security is $41,976 or $3,498 per course (2021 pricing).

Is there fee-help available? 

Yes, Australian citizens are eligible for a HELP loan. You must also be enrolled in a program with the University of Adelaide by the enrolment deadline (census) and have not reached the HELP loan limit. Once you have been offered a place in a University of Adelaide program, you will be able to apply for a HELP loan as a part of the enrolment process. Please see the Study Assist website for further details. 

The University of Adelaide offers three online cyber security programs, each designed to address the skyrocketing demand and your unique career goals. You have the freedom to adapt your learning pathway even after you’ve selected an initial program. The three program tiers are embedded which means there are multiple entry and exit points. 

Start with the graduate certificate and then continue onto the masters program once you’ve reached that milestone or enrol into the masters degree now and opt to graduate with a graduate certificate or diploma if your situation changes. The choice is entirely yours. 

Apply for either the graduate certificate, graduate diploma or masters program via the application portal now or download the brochure to find out more. 

Download a brochure

Apply now

Submit your application for the Master of Cyber Security online in under 15 minutes and hear an outcome in 2 – 5 business days. Start your application now by creating a free account with the University of Adelaide. 

Apply now