{"id":859,"date":"2023-03-08T03:14:54","date_gmt":"2023-03-08T03:14:05","guid":{"rendered":"https:\/\/curtin.edu.my\/study\/undergraduate\/bachelor-engineering-mechanical-2\/"},"modified":"2025-11-05T07:25:25","modified_gmt":"2025-11-05T07:25:25","slug":"bachelor-cyber-security","status":"publish","type":"page","link":"https:\/\/curtin.edu.my\/study\/undergraduate\/bachelor-cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<style>.kadence-column859_3c0fee-72 > .kt-inside-inner-col,.kadence-column859_3c0fee-72 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column859_3c0fee-72 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column859_3c0fee-72 > .kt-inside-inner-col{flex-direction:column;}.kadence-column859_3c0fee-72 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column859_3c0fee-72 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column859_3c0fee-72{position:relative;}@media all and (max-width: 1024px){.kadence-column859_3c0fee-72 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column859_3c0fee-72 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column859_3c0fee-72\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-8f761849 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"wp-block-paragraph\">This course provides you with the expertise needed to excel in the fast-paced and ever-changing Information and Communications Technology (ICT) industry, with a specialised focus on cybersecurity.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Through a series of specialised units, you will develop in-depth knowledge and hands-on experience in critical areas of cybersecurity, including Data Security, Applied Cryptography, Security-Enhanced Programming, Penetration Testing and Defense, Intrusion Detection System and Incident Handling.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The curriculum blends theoretical insights with practical applications, covering both high-level topics like cryptographic techniques, secure coding practices, and developing security policies, network forensics, as well as low-level skills such as identifying vulnerabilities, testing system defenses, detecting intrusions, and managing security incidents.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You will also learn how to tailor security solutions to specific environments, while considering cultural and ethical issues to protect individual privacy and rights. This approach ensures you are equipped to address both the technical and ethical challenges of modern cybersecurity.&nbsp;&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><div class=\"table-block\" data-segment=\"all\">\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Location<\/strong><\/td><td>Perth, Malaysia, Dubai or Sri Lanka<\/td><\/tr><tr><td><strong>Study method<\/strong><\/td><td>Full-time<\/td><\/tr><tr><td><strong>Study mode<\/strong><\/td><td>On-campus<\/td><\/tr><tr><td><strong>Intake<\/strong><\/td><td>February or July<\/td><\/tr><tr><td><strong>Duration<\/strong><\/td><td>3 years<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n<section\n                class=\"block accordions\" role=\"complementary\"\n        aria-label=\"Accordion\"\n        data-segment=\"all\">\n\n        \n\n    <div class=\"accordions__container\">\n                    <div class=\"accordion\">\n            <button class=\"accordion__heading accordion__toggle\" aria-controls=\"entry-requirements\" aria-expanded=\"false\">Entry requirements<span class=\"ico ico-chevron-fat ico--deep-blue\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M10.91 30.41l-2.82-2.82L19.67 16 8.09 4.41l2.82-2.82L25.33 16 10.91 30.41z\"\/><\/svg><\/span><\/button>\n        <div class=\"accordion__content content\" id=\"entry-requirements\" aria-hidden=\"true\">\n                    <p><strong><span style=\"font-size: 15pt;\">English requirements<\/span><\/strong><\/p>\n<div class=\"table-responsive\">\n<table class=\"table table-bordered\" border=\"0\">\n<tbody>\n<tr>\n<td><b>Qualification<\/b><\/td>\n<td><strong>Score<\/strong><\/td>\n<\/tr>\n<tr>\n<td>International English<br \/>\nLanguage Testing System (IELTS)<\/td>\n<td>Overall 6.0<br \/>\n(no individual band below 6.0)(L6, R6, W6, S6)<\/td>\n<\/tr>\n<tr>\n<td>Test of English as a<br \/>\nForeign Language (TOEFL)<\/td>\n<td>68 (band minimum W-21,<br \/>\nL-13, R-13, S-18)<\/td>\n<\/tr>\n<tr>\n<td>SPM 1119 English<\/td>\n<td>C<\/td>\n<\/tr>\n<tr>\n<td>GCE \u2018A\u2019 Level<\/td>\n<td>E<\/td>\n<\/tr>\n<tr>\n<td>GCE \u2018O\u2019 Level<\/td>\n<td>C<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Cut-off scores<\/strong><\/p>\n<table style=\"border-collapse: collapse;\">\n<tbody>\n<tr>\n<td><span style=\"font-size: 12pt;\"><strong>Qualification<\/strong><\/span><\/td>\n<td><span style=\"font-size: 12pt;\"><strong>Score<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">GCE-A Level\/STPM (best of 3 subjects)<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">8<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">UEC (best of 5 selected subjects)<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">22<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">HKDSE<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">18<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">IB<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">29<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">Ontario Gr 12 (best of 6)<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">70<\/span><\/td>\n<\/tr>\n<tr>\n<td>ATAR (including WACE\/SACE\/HCE\/VCE)<\/td>\n<td><span style=\"font-size: 12pt;\">80<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">WAUFP (CPS)<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">59<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">India (CBSE)<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">70%<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">India (HSC)<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">71%<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12pt;\">Sri Lanka<\/span><\/td>\n<td><span style=\"font-size: 12pt;\">8<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"table-responsive\"><\/div>\n<p><strong>Course Prerequisites<\/strong><\/p>\n<p>Mathematics.<\/p>\n<h4>CRL requirement<\/h4>\n<p>It is essential to nominate a major for CRL assessment. A syllabus must also be provided.<\/p>\n\n            <\/div>\n<\/div>                    <div class=\"accordion\">\n            <button class=\"accordion__heading accordion__toggle\" aria-controls=\"professional-recognition\" aria-expanded=\"false\">Professional recognition<span class=\"ico ico-chevron-fat ico--deep-blue\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M10.91 30.41l-2.82-2.82L19.67 16 8.09 4.41l2.82-2.82L25.33 16 10.91 30.41z\"\/><\/svg><\/span><\/button>\n        <div class=\"accordion__content content\" id=\"professional-recognition\" aria-hidden=\"true\">\n                    <p>\u2022 Malaysian Qualifications Agency (MQA)<br \/>\n\u2022 Australian Computer Society<\/p>\n\n            <\/div>\n<\/div>                    <div class=\"accordion\">\n            <button class=\"accordion__heading accordion__toggle\" aria-controls=\"credit-for-previous-study\" aria-expanded=\"false\">Credit for previous study<span class=\"ico ico-chevron-fat ico--deep-blue\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M10.91 30.41l-2.82-2.82L19.67 16 8.09 4.41l2.82-2.82L25.33 16 10.91 30.41z\"\/><\/svg><\/span><\/button>\n        <div class=\"accordion__content content\" id=\"credit-for-previous-study\" aria-hidden=\"true\">\n                    <p>Diploma applications will be treated on case to case basis.<\/p>\n\n            <\/div>\n<\/div>                    <div class=\"accordion\">\n            <button class=\"accordion__heading accordion__toggle\" aria-controls=\"career-opportunities\" aria-expanded=\"false\">Career opportunities<span class=\"ico ico-chevron-fat ico--deep-blue\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M10.91 30.41l-2.82-2.82L19.67 16 8.09 4.41l2.82-2.82L25.33 16 10.91 30.41z\"\/><\/svg><\/span><\/button>\n        <div class=\"accordion__content content\" id=\"career-opportunities\" aria-hidden=\"true\">\n                    <p>\u2022 Cyber security analyst<br \/>\n\u2022 Forensic computer analyst<br \/>\n\u2022 Software developer<br \/>\n\u2022 IT analyst<br \/>\n\u2022 Web application developer<\/p>\n\n            <\/div>\n<\/div>                    <div class=\"accordion\">\n            <button class=\"accordion__heading accordion__toggle\" aria-controls=\"course-structure\" aria-expanded=\"false\">Course structure<span class=\"ico ico-chevron-fat ico--deep-blue\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M10.91 30.41l-2.82-2.82L19.67 16 8.09 4.41l2.82-2.82L25.33 16 10.91 30.41z\"\/><\/svg><\/span><\/button>\n        <div class=\"accordion__content content\" id=\"course-structure\" aria-hidden=\"true\">\n                    <p><strong>Normal Intake<\/strong><\/p>\n<p><strong>YEAR 1 SEMESTER 1<br \/>\n<\/strong>Programming Design and Implementation<br \/>\nIntroduction to Software Engineering<br \/>\nFundamental Concepts of Data Security<br \/>\nIntegrating Indigenous Science and STEM<\/p>\n<p><strong>YEAR 1 SEMESTER 2<\/strong><br \/>\nUnix and C Programming<br \/>\nData Structures and Algorithms<br \/>\nLinear Algebra and Statistics for Engineers<br \/>\nDatabase Systems<\/p>\n<p><strong>YEAR 2 SEMESTER 1<\/strong><br \/>\nComputer Communications<br \/>\nOperating Systems<br \/>\nFundamental Concepts of Cryptography<br \/>\nUnix Systems Programming<\/p>\n<p><strong>YEAR 2 SEMESTER 2<br \/>\n<\/strong>Computing Topics<br \/>\nCyber Crime and Security Enhanced Programming<br \/>\nCyber Security Concepts<br \/>\n<em><strong>Elective Units*<\/strong><\/em><\/p>\n<p><strong>YEAR 3 SEMESTER 1<\/strong><br \/>\nMobile Cloud Computing<br \/>\nMachine Learning<br \/>\nCapstone Computing Project 1<br \/>\n<em><strong>Elective Units**<\/strong><\/em><\/p>\n<p><strong>YEAR 3 SEMESTER 2<\/strong><br \/>\nCapstone Computing Project 2<br \/>\nPenetration Testing and Defence<br \/>\nCyber Security \u2013 Intrusion Detection System and Incident Handling<br \/>\n<em><strong>Elective Units***<\/strong><\/em><\/p>\n<p><strong>ELECTIVE UNITS<\/strong><\/p>\n<p><em><strong>Elective Units*<\/strong><\/em><\/p>\n<ul>\n<li>Requirements Engineering<\/li>\n<li>Computer Systems<\/li>\n<li>Mobile Application Development<\/li>\n<li>Software Engineering Concepts<\/li>\n<\/ul>\n<p><em><strong>Elective Units**<\/strong><\/em><\/p>\n<ul>\n<li>Object Oriented Software Engineering<\/li>\n<li>Design and Analysis of Algorithms<\/li>\n<li>Software Engineering Testing<\/li>\n<li>Human Computer Interface<\/li>\n<\/ul>\n<p><strong><em>Elective Units***<\/em><\/strong><\/p>\n<ul>\n<li>Requirements Engineering<\/li>\n<li>Computer Systems<\/li>\n<li>Mobile Application Development<\/li>\n<li>Software Engineering Concept<\/li>\n<\/ul>\n<hr \/>\n<p><strong>Mid-year Intake<\/strong><\/p>\n<p><strong>YEAR 1 SEMESTER 1<br \/>\n<\/strong>Programming Design and Implementation<strong><br \/>\n<\/strong>Linear Algebra and Statistics for Engineers<br \/>\nDatabase Systems<br \/>\nComputer Systems<\/p>\n<p><strong>YEAR 1 SEMESTER 2<\/strong><br \/>\nUnix and C Programming<br \/>\nData Structures and Algorithms<br \/>\nIntroduction to Software Engineering<br \/>\nIntegrating Indigenous Science and STEM<\/p>\n<p><strong>YEAR 2 SEMESTER 1<\/strong><br \/>\nComputer Communications<br \/>\nCyber Security Concepts<br \/>\n<em><strong>Elective Units (Select the following 2 units to the total value of 50 credits)<\/strong><\/em><\/p>\n<ul>\n<li>Requirements Engineering<\/li>\n<li>Mobile Application Development<\/li>\n<\/ul>\n<p><strong>YEAR 2 SEMESTER 2<br \/>\n<\/strong>Capstone Computing Project 1<br \/>\nUnix Systems Programming<br \/>\nOperating Systems<br \/>\nFundamental Concepts of Data Security<\/p>\n<p><strong>YEAR 3 SEMESTER 1<\/strong><br \/>\nComputing Topics<br \/>\nPenetration Testing and Defence<br \/>\nCyber Security \u2013 Intrusion Detection System and Incident Handling<br \/>\nCyber Crime and Security Enhanced Programming<\/p>\n<p><strong>YEAR 3 SEMESTER 2<\/strong><br \/>\nCapstone Computing Project 2<br \/>\nMobile Cloud Computing<br \/>\nMachine Learning<br \/>\nFundamental Concepts of Cryptography<\/p>\n\n            <\/div>\n<\/div>                    <div class=\"accordion\">\n            <button class=\"accordion__heading accordion__toggle\" aria-controls=\"course-fee\" aria-expanded=\"false\">Course fee<span class=\"ico ico-chevron-fat ico--deep-blue\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M10.91 30.41l-2.82-2.82L19.67 16 8.09 4.41l2.82-2.82L25.33 16 10.91 30.41z\"\/><\/svg><\/span><\/button>\n        <div class=\"accordion__content content\" id=\"course-fee\" aria-hidden=\"true\">\n                    <p>RM34,500 per annum for local student<\/p>\n<p>RM48,100 per annum for international student<\/p>\n<p><span style=\"font-size: 12pt;\"><em>*The indicative course fee shown on the Letter of Offer might vary from the actual course fee according to the units undertaken. The indicative fee is just a guide as to what the course fee will be, until semester enrolment is completed.<\/em><\/span><\/p>\n\n            <\/div>\n<\/div>            <\/div>\n\n<\/section>\n\n\n\n<p style=\"font-size: 14px;\"><a href=\"https:\/\/curtin.edu.my\/study\/copyright-and-accuracy\/\">View course information disclaimer<\/a><br \/>This page was last updated on 5 November 2025<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course provides you with the expertise needed to excel in the fast-paced and ever-changing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":824,"menu_order":34,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_crdt_document":"","_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","footnotes":""},"tags":[],"class_list":["post-859","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/pages\/859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/comments?post=859"}],"version-history":[{"count":0,"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/pages\/859\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/pages\/824"}],"wp:attachment":[{"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/media?parent=859"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/curtin.edu.my\/study\/wp-json\/wp\/v2\/tags?post=859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}