AIBI Logo

Contact Us

Campuses

Sydney

Level 2, 451 Pitt St,
Sydney, NSW 2000,
Australia.

Melbourne

Level 5, 440 Elizabeth Street,
Melbourne, VIC 3000,
Australia.

Brisbane

3431 Pacific Hwy, Slacks Creek,
Brisbane, QLD 4127,
Australia.

Perth

74 Walters Drive, Osborne Park,
Perth, WA 6017,
Australia.

Master of information technolgy in

Cyber Security

CRICOS: 117715D •   Course ID: CRS1401734

Master of Information Technology in Cyber Security Specialisation

Launch your career in one of the world’s most critical and fast-growing fields.

The Master of Information Technology (MIT) with a Specialisation in Cyber Security is designed to equip graduates with the skills and confidence to thrive in today’s digital world. No prior IT experience is required.

 This program offers the perfect pathway whether you’re pivoting into tech or aiming to specialise in cyber defence. 

Built for beginners, shaped for experts

In the first year, you’ll build a strong technical foundation through introductory courses in networking, operating systems security, and database management systems. These units are carefully scaffolded to ensure accessibility for students from non-technical backgrounds.

 Cybersecurity at its core

With a strong emphasis on technology and the human elements of cyber defence, you’ll gain critical skills in:

  • Network security and digital infrastructure protection
  • Ethical hacking and penetration testing
  • Digital forensics and incident response
  • AI-powered data analysis
  • Cyber governance, legal frameworks, and ethical risk management

Real-world learning for real-world impact

You’ll engage in hands-on projects, simulated cyber-attack scenarios, and real-world case studies. Industry guest lectures and applied learning opportunities ensure you graduate with practical experience and job-ready capabilities.

 Graduate with purpose

This program is purpose-built to prepare you for roles such as Cyber Security Analyst—the primary target role—along with opportunities in security architecture, threat intelligence, and data protection. With demand for skilled cybersecurity professionals skyrocketing across all industries, your future starts here.

Study Mode

On Campus, Online

Campus Locations

Sydney, Melbourne, Brisbane, Perth

Student

Domestic, International

Course Duration

2 years full time, up to 6 years part time for domestic students only.

Next Start Date

September, 2025

Fees & Scholarships

Industry Insights

Billion Dollars

. According to Grand View Research, the market is projected to reach $500.70 billion by 2030, growing at a compound annual growth rate (CAGR) of 12.9% from 2025 to 2030.

Percent Higher Revenue Growth Rate

A report by the IBM Institute for Business Value found that organizations with mature cybersecurity practices experienced a 43% higher revenue growth rate over five years compared to those with less mature practices.

Percentage Business Leaders

A Gartner survey revealed that 85% of business leaders consider cybersecurity to be critical for growth, underscoring its role in enabling innovation and maintaining customer trust.

Career Pathways – Master of Information Technology (Cyber Security)

With over 3.5 million cybersecurity roles projected to remain unfilled globally by 2025, the demand for qualified professionals in this space has never been greater.

The Master of Information Technology (Cyber Security) is designed to address this critical skills gap, equipping graduates with the knowledge and technical expertise required to excel in today’s fast-evolving digital landscape.

Backed by substantial Australian government investment in cybersecurity education and workforce development, this program aligns closely with key national and international standards, including:

  • SFIA (Skills Framework for the Information Age)
  • Cybok (Cyber Security Body of Knowledge)
  • ACS CBoK (Australian Computer Society Core Body of Knowledge)

 These frameworks ensure our graduates meet the expectations of industry, regulatory bodies, and employers, enabling them to take on critical roles in protecting data, systems, and digital infrastructure.

 Primary Career Outcomes:  

Graduates of the MIT (Cyber Security) specialisation will be well-positioned for a variety of high-demand, high-impact roles, including:

  • Cybersecurity Analyst
    Monitor networks, investigate incidents, identify vulnerabilities, and implement proactive security solutions to protect organisations from digital threats.
  • Security Engineer
    Design, test, and maintain secure IT environments. Conduct risk assessments, perform penetration testing, and apply best practices in system hardening and threat mitigation.
  • Security Consultant
    Advise organisations on cybersecurity strategy, compliance, and risk management. Customise security solutions and provide ongoing assessments aligned to industry standards.
  • Digital Forensics Investigator
    Uncover, analyze, and present digital evidence related to cybercrimes or policy violations, supporting both internal investigations and legal proceedings.
  • Security Architect
    Develop and implement robust, enterprise-wide security frameworks and infrastructure to protect complex IT systems and digital assets.

 A Launchpad for Future Growth

Beyond these core roles, graduates will possess the versatility to work across a wide range of IT and data-driven environments.

The program’s emphasis on communication, teamwork, and strategic thinking ensures students can lead and collaborate effectively in multi-disciplinary teams.

Additionally, the course provides a solid foundation for pursuing further industry-recognised certifications such as:

  • Certified Ethical Hacker (CEH)
  • Certified Information Systems Security Professional (CISSP)

Whether you’re entering the field or upskilling to advance your career, the MIT (Cyber Security) program prepares you to thrive in a world where digital security is more critical than ever

    Complimentary Student Memberships

    AISA Membership

    AISA is a nationally recognised peak body for cyber security professionals. AIBI HE students who study cyber security are eligible for a free AISA membership.

    ACS Membership

    ACS is the professional association for Australia’s technology sector and the largest community with 48,000+ members. All AIBI HE students are eligible to sign up for their free ACS membership.

    Course Subjects

    Master of Information Technology (Cyber Security)

    The table below provides essential information for each core subject, code and title, description, and assessment tasks.

    The workload is the same for all subjects:
    3 timetabled hours per week (lectures and tutorials) and 9 personal hours of study for a total of 12 hours per week.

    Year 1

    Core ICT702 Programming Fundamentals

    Core ICT702 Programming Fundamentals introduces students to the foundational concepts of computer programming. It covers key principles such as variables, data types, control structures, functions, and basic object-oriented programming. Designed for beginners, this subject provides hands-on experience in writing and debugging code, helping students develop problem-solving skills and a solid understanding of how software operates.

    Core ICT703 Network Fundamentals
    Core ICT703 Network Fundamentals provides an introduction to the basic concepts and principles of computer networking. Students will learn about network types, architectures, protocols, and devices such as routers, switches, and firewalls. The subject covers essential topics like the OSI and TCP/IP models, IP addressing, and network security fundamentals, equipping students with the foundational knowledge required to understand, design, and troubleshoot simple network systems.
    Core PMT701 Project Management (Agile)
    Core PMT701 Project Management (Agile) introduces students to the principles and practices of project management with a focus on Agile methodologies. The subject covers key concepts such as project planning, scope management, time and cost estimation, risk management, and stakeholder communication. Emphasizing Agile frameworks like Scrum and Kanban, students will learn how to manage projects in dynamic environments, adapt to change, and deliver value through iterative development and team collaboration.
    Core ICT705 Database system analysis and design
    Core ICT705 Database System Analysis and Design focuses on the principles and techniques used in designing effective and efficient database systems. Students will learn about data modeling, normalization, relational database concepts, and SQL. The subject also covers the database development lifecycle, from requirements analysis to implementation, emphasizing the importance of data integrity, security, and performance. Through practical exercises, students gain hands-on experience in designing and managing databases to support real-world applications.
    Core CYB701 Cyber Security Fundamental & Ethics
    Core CYB701 Cyber Security Fundamentals & Ethics introduces students to the essential concepts of cyber security alongside the ethical and legal considerations in the digital world. Topics include threat types, vulnerabilities, security controls, encryption, and risk management. The subject also explores professional ethics, privacy issues, and cyber laws, helping students understand the responsibilities and ethical challenges faced by cyber security professionals. It lays a strong foundation for further study and careers in the field of cyber security.
    Core ICT706 Network Security
    Core ICT706 Network Security provides students with a comprehensive understanding of how to protect and secure computer networks against cyber threats. The subject covers key topics such as firewalls, intrusion detection and prevention systems, VPNs, encryption, authentication protocols, and network security policies. Students will also explore common attack methods and learn how to design and implement security measures to safeguard network infrastructure. Practical exercises reinforce theoretical knowledge, preparing students for real-world network security challenges.
    Core ICT707 Information security management Elective IT Elective
    Core ICT707 Information Security Management explores the strategic and operational aspects of managing information security within an organization. Students will learn about security governance, risk assessment, compliance standards (such as ISO/IEC 27001), incident response, and business continuity planning. The subject emphasizes aligning security practices with business objectives, developing security policies, and managing human factors in security. As an elective IT subject, it equips students with the skills to lead and manage enterprise-level security programs effectively.

    Year 2

    Core CYB702 Ethical Hacking and Penetration Testing
    Core CYB702 Ethical Hacking and Penetration Testing introduces students to the tools, techniques, and methodologies used by ethical hackers to identify and address security vulnerabilities. The subject covers penetration testing frameworks, reconnaissance, vulnerability assessment, exploitation, and post-exploitation techniques. Emphasis is placed on legal and ethical considerations, responsible disclosure, and the use of industry-standard tools in a controlled environment. Students gain hands-on experience in simulating real-world cyberattacks to strengthen system defenses.
    Core CYB703 Cyber Physical Systems and IoT Security
    Core CYB703 Cyber Physical Systems and IoT Security focuses on the security challenges and solutions related to Cyber-Physical Systems (CPS) and the Internet of Things (IoT). Students will explore the architecture, communication protocols, and vulnerabilities of connected devices and embedded systems. The subject covers threat modeling, secure system design, and risk mitigation strategies for IoT environments. Emphasis is placed on real-world applications such as smart homes, industrial control systems, and critical infrastructure, preparing students to secure emerging technologies in an increasingly connected world.
    Core CYB704 Information Security and Cryptography Techniques
    Core CYB704 Information Security and Cryptography Techniques provides an in-depth understanding of information security principles and the role of cryptography in protecting data. Students will learn about classical and modern encryption methods, cryptographic algorithms, digital signatures, key management, and secure communication protocols. The subject also covers the application of cryptographic techniques in ensuring confidentiality, integrity, authentication, and non-repudiation. Through theoretical and practical learning, students gain the skills to apply cryptographic solutions to real-world security challenges.
    Core CYB705 Threat intelligence
    Core CYB705 Threat Intelligence focuses on the processes and tools used to collect, analyze, and apply information about current and emerging cyber threats. Students will learn how to identify threat actors, understand their tactics, techniques, and procedures (TTPs), and transform raw data into actionable intelligence. The subject covers strategic, operational, and tactical threat intelligence, as well as threat modeling frameworks such as MITRE ATT&CK. By the end of the course, students will be equipped to support proactive defense strategies and enhance an organization’s cyber resilience.
    Core CYB711 Cloud Security
    Core CYB711 Cloud Security explores the principles, practices, and technologies involved in securing cloud computing environments. Students will learn about cloud service models (IaaS, PaaS, SaaS), shared responsibility models, identity and access management, data protection, and compliance requirements in the cloud. The subject also covers common cloud vulnerabilities, threat mitigation strategies, and secure cloud architecture design. Emphasis is placed on real-world applications and industry standards, preparing students to effectively manage and secure cloud-based systems.
    Core CAP701 Capstone Project
    Core CAP701 Capstone Project is a culminating subject that allows students to apply the knowledge and skills gained throughout their course to a real-world or research-based project. Working individually or in teams, students will plan, design, implement, and present a comprehensive solution to a complex problem in their area of study. The subject emphasizes project management, critical thinking, problem-solving, and effective communication, providing a valuable opportunity to showcase professional and technical competencies in a practical context.
    Elective IT Elective
    Elective IT Elective allows students to choose a subject from a range of Information Technology-related options based on their interests or career goals. These electives may cover areas such as software development, data analytics, artificial intelligence, cloud computing, cyber security, or emerging technologies. The flexibility of elective subjects enables students to broaden their knowledge, deepen expertise in a specific field, or complement their core studies with industry-relevant skills.

    Choice of Electives

    Elective CYB706 Digital forensics
    Elective CYB706 Digital Forensics introduces students to the principles and practices of investigating cybercrimes and retrieving digital evidence. The subject covers forensic processes, evidence collection and preservation, file system analysis, memory and network forensics, and the use of forensic tools. Students will also explore legal and ethical considerations in digital investigations. Through hands-on exercises and case studies, students gain practical skills in identifying, analyzing, and presenting digital evidence for legal or organizational purposes.
    Elective CYB708 Cyber ethics
    Elective CYB708 Cyber Ethics explores the ethical, legal, and social issues arising from the use of digital technologies and the internet. Students will examine topics such as privacy, intellectual property, digital rights, cyberbullying, surveillance, and the ethical responsibilities of IT professionals. The subject encourages critical thinking and ethical decision-making in complex situations involving emerging technologies. By understanding the broader implications of cyber activities, students are better equipped to act responsibly and ethically in their professional roles.
    Elective CYB709 AI and Big Data Security
    Elective CYB709 AI and Big Data Security examines the security and privacy challenges associated with Artificial Intelligence (AI) systems and big data environments. Students will explore threats specific to AI models, such as adversarial attacks and data poisoning, as well as techniques for securing large-scale data storage, processing, and analytics platforms. The subject also covers ethical considerations, compliance issues, and the use of AI for enhancing cyber security. Through case studies and practical exercises, students gain insights into securing intelligent and data-intensive systems in real-world contexts.
    Elective ICT708 Management Information Systems
    Elective ICT708 Management Information Systems focuses on the role of information systems in supporting business operations, decision-making, and strategic planning. Students will explore how organizations use systems to manage data, improve efficiency, and gain competitive advantage. Key topics include system components, types of information systems (such as ERP, CRM, and DSS), systems development, and IT governance. The subject also examines the alignment of IT with business goals, enabling students to understand and contribute to effective technology-driven management practices.
    Elective CYB710 Operating System Security
    Elective CYB710 Operating System Security provides students with an in-depth understanding of securing operating systems against various threats and vulnerabilities. The subject covers key concepts such as access control, authentication, secure boot, file system protection, process isolation, and patch management across major operating systems like Windows, Linux, and macOS. Students will also explore techniques for detecting and mitigating malware, rootkits, and privilege escalation attacks. Through hands-on labs and real-world scenarios, the subject equips students with practical skills to harden and defend operating systems effectively.
    Electives - MGT602 - Managing Diverse Talent

    Understand the challenges and benefits of managing a diverse workforce. Learn strategies to create inclusive work environments, improve employee engagement, and leverage diversity for business success.

    Entry Details

    Fees & Scholarships

    Domestic students may be eligible for FEE-HELP; a loan scheme offered by the Australian Government that assists eligible students in paying for their higher education tuition fees.

    Additionally, you may be eligible for one of our domestic scholarships, which rewards people who demonstrate resilience, passion and desire to achieve.

    Speak to our team regarding our course fee structure, or scholarship options. 

    Eligibility Criteria

    Entry details:

    General Criteria All applicants for the for the Master of Business Administration (MBA – DT) and its nested awards the
    Graduate Certificate and Graduate Diploma in Business Administration must satisfy the following.
    requirements relevant to their status as either a domestic or an international applicant and be aged 18 years or over at the time of course commencement.

    Previous Studies:

    Successful completion of at least a Bachelor degree from an Australian higher education or equivalent

    Fees & Scholarships

    Contact our team regarding our course fee structure, and payment options. 

    Eligibility Criteria

    Academic IELTS 6.5 (no band less than 6.0) or equivalent. Overseas and domestic applicants who have not studied at the secondary level in English, seeking admission into an AIBI HE course will need to demonstrate the required level of English proficiency.
    Education:

    Successful completion of at least a Bachelor degree or equivalent.

    For more information on admissions criteria, visit our Applying to AIBI HE page.

    Fees, Financial Assistance, and Your Investment

    Pursuing a Master of Information Technology (Cyber Security) is not just a commitment to your future—it’s a strategic investment in your career. We understand the importance of financial planning, so let’s break down the fees and available support options.
    Master of Information Technology (Cyber Security)

    The program consists of 16 units delivered over 6 trimesters.

    Introductory Pricing (First Two Intakes)

    To support the launch of the program, we are offering an introductory fee discount:

    INTERNATIONAL STUDENTS: 

    • Discounted Tuition: $2,700 per subject
    • Total Introductory Cost: $43,200*

    Standard Fee

    • Standard Tuition: $3,375 per subject
    • Total Estimated Cost: $54,000

    DOMESTIC STUDENTS: 

    • Discounted Tuition: $2,231 per subject
    • Total Introductory Cost: $35,700*

    Standard Fee

    • Standard Tuition: $2,625 per subject
    • Total Estimated Cost: $42,000

      We offer a range of financial support options, including:

      • Scholarships & Discounts for eligible students.
      • Corporate Sponsorships for professionals supported by their employers.

      Speak to a member of our team for more information. https://aibi.edu.au/contact-us/

      How to Apply

      1

      Choose Your Degree

      Take your time and pick the course that excites you the most. You can always speak to our team before making a decision.

      2

      Check Admissions Criteria

      Make sure you’ve got everything you need to apply by double-checking our admissions criteria. It won’t take long, we promise!

      3

      Apply

      Fill out your application and hit submit! Our team will check over your application and get back to your as soon as possible.

      4

      Complete Enrollment

      Wahey, you’re almost there!
      We’ll just have to get a few final details before you’re officially an AIBI HE student.

      FAQ’s

      Will all classes be in-person?

      Yes, all classes will be conducted in-person, and attendance is mandatory.

      Note: This does not apply to domestic students who are enrolled in online study with AIBI HE.

      How long is each academic year?

      Each academic year includes three trimesters, each lasting 12 weeks. 

       

      What will my class schedule look like?

      We normally hold your classes across 2 days. For instance:
      Tuesday: Classes from 9-12 and then 1-4 or 1-4 and then 4.30-7.30.
      Thursday: Class either from 9-12, 1-4 or 4.30-7.30.

      Can I work while I study?

      If you’re an international student, you can work 48 hours per fortnight during ongoing terms, and unlimited hours during holiday breaks.

      Domestic students do not have a working cap. 

      Where are your campuses located?

      We have campuses located in Sydney, Melbourne, Brisbane, and Perth.

      You can view our campuses online, or request an in-person campus tour.

      Is attendance mandatory for orientation?

      Yes, your attendance is mandatory for orientation.

      You will receive more details on your orientation after you receive your COE.