fbpx
AIBI Logo

Contact Us

Campuses

Sydney

Level 2, 451 Pitt St,
Sydney, NSW 2000,
Australia.

Melbourne

Level 5, 440 Elizabeth Street,
Melbourne, VIC 3000,
Australia.

Brisbane

3431 Pacific Hwy, Slacks Creek,
Brisbane, QLD 4127,
Australia.

Perth

74 Walters Drive, Osborne Park,
Perth, WA 6017,
Australia.

Bachelor of

Cyber Security

 

CRICOS: 112840F   •   Course ID: CRS1401441

What is BCS?

The Bachelor of Cyber Security (BCS) at AIBI Higher Education provides students with the practical skills and knowledge to defend organisations against modern cyber threats.

This degree offers a solid foundation for a career in the growing cyber security sector. Students will also be exposed to highly useful subjects focusing on soft skills and human factors.

Learning Outcomes

• Develop a deep understanding of the concepts and technologies related to information security.

• Learn about encryption, firewalls, network security, ethical hacking, and various threat intelligence strategies.

• Gain hands-on experience in security operations, risk management, incident response, and business continuity planning.

Study Mode

On Campus, Online

Campus Locations

Sydney, Melbourne, Brisbane, Perth

Student

Domestic, International

Course Duration

3 years full time, 6 years part time

Next Start Date

3rd March, 2025

Fees & Scholarships

Industry Insights

Billion Dollars

Expected Market Worth by 2033

Million

New Job Openings by 2025

Trillion Dollars

Expected Annual Cybercrime Costs by 2025

Career Pathways

With the cyber security industry booming, there’s huge demand, great pay, and tons of really exciting career pathways for cyber security graduates!

You’ll be ready for exciting roles in security ops, penetration testing, threat intelligence, and more. See below for some industry salary stats.

Potential Careers

• Cyber Security Analyst
Avg. Salary: $111,694

• Penetration Tester
Avg. Salary: $125,000

• Security Consultant
Avg. Salary: $140,000

All salaries, sourced from talent.com, are accurate as of September 2024.

Complimentary Student Memberships

AISA Membership

AISA is a nationally recognised peak body for cyber security professionals. AIBI HE students who study cyber security are eligible for a free AISA membership.

ACS Membership

ACS is the professional association for Australia’s technology sector and the largest community with 48,000+ members. All AIBI HE students are eligible to sign up for their free ACS membership.

Course Subjects

The table below provides essential information for each core subject, code and title, description, and assessment tasks.

The workload is the same for all subjects:
3 timetabled hours per week (lectures and tutorials) and 9 personal hours of study for a total of 12 hours per week.

Year 1 (Level 100)

CYB101 Introduction to Cyber Security

This subject provides a holistic approach to cyber security. After discussing the threat landscape, including common cyber threats as well as cybercriminal categories and motivations, it examines the devastating impact that cybercrime can have on individuals and organisations through case studies.

Cyber hygiene and organisational security principles are then introduced to help individuals and businesses remain safe in the digital world. The unit concludes by addressing cybersecurity governance.

It presents various risk assessment methodologies, risk management frameworks, mitigation strategies as well as the ethical and legal aspects of cyber security.

Assessment Tasks:
Student Engagement, Tests, Cyber Hygiene Project, Final Examination

BUS105 Communications

This subject provides students with an introduction to communications in a business environment. An essential skill of any successful professional in today’s competitive business environment is the ability to communicate: to understand and be understood, both within the organisation and externally with suppliers, customers and a range of stakeholders.

Business organisations today are seeking well-rounded employees who can demonstrate strong communication skills across a range of mediums. This is particularly true across the areas of international business, enterprise management systems and cyber security.

Throughout this subject, students develop their ability to identify, gather and present information in a range of oral, written and visual contexts, using digital and non-digital channels. There is a focus on mobile communication and its effect on contemporary business practices with students exploring how globalisation and social media are changing business communication.

The subject concludes with students examining some of the emerging technologies that have the potential to reshape business communication in the near future.

Assessment Tasks:
Presentations, Written Reports, Group Oral Presentation

BUS110 Quantitative Methods for Business

The subject provides students with a background on data analysis techniques and statistical concepts. It explores various methods of data collection and sampling with an emphasis on the question of data quality. It examines graphical and numerical statistical methods and introduces concepts such as probabilities, models, distributions, inference, Bayesian statistics, estimation, and hypothesis testing.

Besides the direct benefit of mastering basic statistical notions and techniques, the unit also provides a foundation to tackle data analytics and artificial intelligence concepts, which are playing an increasingly important role in areas such as international business, enterprise management systems and cyber security.

This subject relies on a hands-on approach and involves the use of dedicated computer software to analyse data coming from different fields and involved in various scenarios. Throughout the unit, students are prompted to critically assess the pertinence of the methods used.

Assessments Tasks:
Student Engagement, Tests, Data Analysis Assignment

ICT125 Programming Fundamentals

This subject introduces programming using Python. It discusses fundamental programming concepts such as variables, functions, recursion, data structures, and objects in an interactive way, using Jupyter Notebook.

Each week, students further develop their problem-solving skills and algorithmic capabilities. They do so by tackling practical issues, many of them relevant to cyber security and implementing their approach in a Python program.

The importance of ethics and sound software engineering practices, in particular documentation, testing and debugging are continuously reinforced throughout the entire unit.

Assessment Tasks:
Student Engagement, Tests, Programming Assignments, Practical Examination

ICT130 Networking Essentials

This subject provides students with essential data communications and networking concepts. Students develop a sound foundation for each layer of the OSI model, including their architecture, workflow, properties, purpose, and functions.

They also explore the principles and mechanisms required to transmit data across a network starting from the physical layer, all the way to the top, the software platform.

They examine the workflow executed during this transmission, implement and configure various network protocols within a simulated environment using industry-known networking tools.

Assessment Tasks:
Student Engagement, Tests, Practical Assignments, Final Examination

ICT140 Systems and Database Design

This subject introduces students to the fundamental principles of database systems, including how organisations structure and manage corporate information within the data processing lifecycle.

Students translate business requirements into conceptual data models using data modelling tools and techniques, which are then transformed into relational databases, applying normalisation techniques.

Students manipulate data and logical structures in a relational database management system using SQL, a domain-specific query language. The concepts and issues related to contemporary database technologies with their applications and information security are also examined to underpin current industry practices.

Assessment Tasks:
Student Engagement, Tests, Data Modelling and SQL Assignment, Practical Examination

Elective 1

Students must pick two of the following electives as part of their level 100 studies:

BUS100 Accounting for Business
BUS101 Business Information Systems
BUS102 Introduction to Enterprise Management Systems
BUS103 Introduction to International Business
BUS104 Business Marketing
MGT101 Operations and Logistics Management

Elective 2

Students must pick two of the following electives as part of their level 100 studies:

BUS100 Accounting for Business
BUS101 Business Information Systems
BUS102 Introduction to Enterprise Management Systems
BUS103 Introduction to International Business
BUS104 Business Marketing
MGT101 Operations and Logistics Management

Year 2 (Level 200)

CYB210 Applied Cryptography

This subject provides students with the necessary background to understand modern cryptographic primitives such as hash functions, symmetric-key ciphers, public-key cryptography, and digital signatures.

It tackles elementary cryptanalysis techniques before addressing protocols such as key exchange, key management, secret sharing, zero knowledge proof, etc.

Students then learn how these primitives and protocols are used in concrete applications such as data protection, identity management, access control, blockchain, cryptocurrencies, electronic voting, etc.

Assessment Tasks:
Student Engagement, Tests, Catch the Flag Assignment, Practical Examination

BUS201 Data Analytics

This subject introduces students to the fundamental concepts underlying data analytics and Big Data. Students build a solid foundation in various frameworks, techniques and tools to perform descriptive, and more importantly predictive modelling.

The subject also addresses the crucial question of business reporting with an emphasis on visualisation techniques.

Assessment Tasks:
Student Engagement, Tests, Case Study, Final Examination

CYB225 Secure Coding

This subject further develops the student’s knowledge and programming skills by exposing them to a new language (Rust), while focusing on security issues.

It investigates real-life examples where the exploitation of software vulnerabilities has led to resounding disasters. The unit also addresses common software vulnerabilities, as well as the techniques and tools to detect and fix them.

The subject then moves to best practices regarding the software development life cycle, introducing DevSecOps and insisting on the critical importance of integrating security concerns at each stage of the process.

Assessment Tasks:
Student Engagement, Tests, Group Programming Assignments, Practical Examination

CYB230 Network and Web Security

This subject builds on networking essentials to provide students with the knowledge and skills required for network security, including wireless networks, as well as web security.

It focuses on specific threats, common vulnerabilities and the risks that they create in the context of interconnected computing devices.

It addresses a range of strategies, techniques and tools to mitigate those risks, such as firewalls, VPN, Access Control List (ACL), zero trust, end-point security, etc. It also tackles the deployment of a simple Intrusion Detection System (IDS) through the network.

Assessment Tasks:
Student Engagement, Tests, Networking Group Assignments, Practical Examination

CYB235 Cloud Security

This subject introduces cloud computing with an emphasis on cloud security. It covers the foundations of cloud computing, including distributed systems, concurrency and virtualisation, before addressing the different models, architectures and technologies involved in cloud computing.

The subject focuses next on important operations and practicals: data migration, identity and access management, etc.

The final part is entirely dedicated to cloud security, taking into account governance aspects, guidelines and standards, as well as technical elements to address vulnerabilities, data security and privacy risks in the cloud.

Assessment Tasks:
Student Engagement, Tests, Consultancy Report, Final Examination

CYB250 Cybercrime, Cyberlaw and Cyber-ethics

This subject provides students with an extensive theoretical and cross-disciplinary background in cyber security, specifically in the areas of crime, ethics and regulations.

It presents the transnational nature of cybercrime and students explore how national laws, regulations and international treaties help deal with cybercrime in cyberspace.

This subject prompts students to evaluate the effectiveness of these cyber laws against cybercrime in an attempt to bring cybercriminals to justice.

Finally, students examine cybersecurity issues and emerging global technologies within a business context through the lens of ethical and legal considerations.

Assessment Tasks:
Student engagement, Tests, Legal group report, Final examination

Elective 1

Students must pick two of the following electives as part of their level 200 studies:

BUS203 Business Process Management
BUS205 Research Methods
MGT201 International Law and Politics
MGT202 International Strategic Management
MGT203 Production and Service Delivery Systems
MGT204 Inventory and Asset Management Systems
MGT205 Entrepreneurship and Innovation
MGT206 Business Law
MGT208 Organisational Behaviour and Change

Elective 2

Students must pick two of the following electives as part of their level 200 studies:

BUS203 Business Process Management
BUS205 Research Methods
MGT201 International Law and Politics
MGT202 International Strategic Management
MGT203 Production and Service Delivery Systems
MGT204 Inventory and Asset Management Systems
MGT205 Entrepreneurship and Innovation
MGT206 Business Law
MGT208 Organisational Behaviour and Change

Year 3 (Level 300)

CYB310 Digital Investigations and Forensics

This subject provides an introduction to digital forensics processes, methods, techniques and tools.

The first part focuses on understanding the profession, the ethical requirements and the processes used to maintain the chain of custody.

The second part deals with the technical side of digital forensics, including how to acquire and recover data from a variety of sources.

The last part is dedicated to analysing and reporting evidence in a professional manner, for instance as an expert witness.

Assessment Tasks:
Student Engagement, Tests, Data Recovery Assignment, Final Examination

CYB340 Cyber Physical Systems and IoT Security

This subject explores the concepts, tools and techniques for securing Cyber Physical Systems and IoT devices.

With the convergence of information technology and operational technology, the rapid growth, and the pervasive role of smart objects, security must be at the forefront of the mind when designing and implementing solutions.

This subject addresses all the elements necessary to create smart and secure connected objects: architecture, protocols, threats, vulnerabilities, and risks as well as the controls and countermeasures that can be applied to mitigate those risks.

This subject provides many examples such as automated vehicles, smart homes, smart cities, industrial controls and wearables.

Assessment Tasks:
Student Engagement, IoT Implementation Project, Security Evaluation Report, Final Examination

CYB345 Penetration Testing

This subject provides an introduction to penetration testing also known as ethical hacking. Ethics and ethical behaviour play a central role.

Indeed, during the course of this subject, students gain the knowledge and hacking skills required to systematically search for potential vulnerabilities in software, protocols and systems.

Students are also taught how to report those vulnerabilities so that they can be fixed. As such, communication also plays a crucial role in this unit.

Assessment Tasks:
Student Engagement, First CTF, Group CTF, Research and Presentation, Final CTF

CYB350 Cyber Security Operations

This subject provides a practical approach to security operations. It covers three main areas.

First, security architecture (seen as integrated into the overall Enterprise Architecture) addresses authentication, authorisation and access control models as well as security and privacy by design.

Second, we focus on managing day-to-day operations, including how to integrate old and new technologies, manage a SIEM and apply SOAR methodologies.

Third, we concentrate on dealing with a security incident, addressing business continuity, incident response plan, digital forensics and evidence management.

Assessment Tasks:
Student Engagement, Tests, Incident Response Group Assignment, Final Examination

CYB355 Cybergovernance Risk and Compliance

This subject provides a hands-on introduction to cybersecurity management. It presents well-known cyber governance standards such as NIST CSF and ISO27001, covering a range of topics, including legal and ethical issues, regulatory requirements, the human factor and security culture, as well as policy development.

It also focuses on the notion of risk and discusses qualitative and quantitative risk assessment approaches such as risk matrices and the FAIR (Factor Analysis of Information Risk) methodology.

Emphasis is given throughout the unit on how to effectively communicate cybersecurity risks to senior audiences.

Assessment Tasks:
Student Engagement, Tests, Security Maturity Assessment Group Project and Presentation, Final Examination

CYB358 Project Management

This subject is a theoretical introduction to the management of projects in Cyber Security. It aims at equipping students with a solid understanding of project management principles. It also presents contemporary project management techniques and tools.

It insists on the importance of understanding the context of an organisation prior to and during the implementation of the project.

It also aims to develop an understanding of the factors that make a project successful, including leadership, communication, business acumen, etc.

Assessment Tasks:
Student Engagement, Test, Case Study, Final Examination

CYB360 Capstone Project

In this subject, a group of students work together as a team for a fictitious company called HACKME, over the course of one trimester.

HACKME faces a multiplicity of cybersecurity challenges, ranging from its people, culture, business processes and use of technology.

After a detailed introduction of the different facets of the company, students need to identify and select a practical and complex cybersecurity issue faced by HACKME and justify why it needs to be addressed, from a business point of view.

Students then plan and implement a comprehensive project in response to that issue, pulling together the knowledge and skills that they acquired in previously studied units.

Assessment Tasks:
Project Pitch and Approval, Project Plan and Proposal, Project Update Report, Project Deliverables, Reflective Journal, Final Presentation

*Please note that this capstone project is worth 20 credits.

Entry Details

Fees & Scholarships

Domestic students may be eligible for FEE-HELP; a loan scheme offered by the Australian Government that assists eligible students in paying for their higher education tuition fees.

Additionally, you may be eligible for one of our domestic scholarships, which rewards people who demonstrate resilience, passion and desire to achieve.

Speak to our team regarding our course fee structure, or scholarship options. 

Eligibility Criteria

Age at Time of Course Commencement

• 17 or older

Early Entry Program

• Students undertaking Year 12 in Australia are encouraged to apply for our Early Entry Program. All applicants must be currently in Year 12 and eligible to receive an ATAR.

For more information on admissions criteria, visit our Applying to AIBI HE page.

*Note: Students entering this course are required to have their own personal laptop with the following specifications:

• Minimum: 8th Gen Intel Core i5 or AMD Ryzen 5, 16GB of RAM and 512GB SSD of storage.
• Recommended: 9th Gen Intel Core i7 or AMD Ryzen 7, 32GB of RAM and 1TB SSD of storage.

Fees & Scholarships

Contact our team regarding our course fee structure, and payment options. 

Eligibility Criteria

Age at Time of Course Commencement

• 18 or older

Education

Year 12 Completion (or equivalent). Requirements differ per country.

English Proficiency:

• IELTS: 6.0 Overall (no band less than 5.5, or equivalent)
• PTE: 52 Overall (no band less than 50, or equivalent)

For more information on admissions criteria, visit our Applying to AIBI HE page.

*Note: Students entering this course are required to have their own personal laptop with the following specifications:

• Minimum: 8th Gen Intel Core i5 or AMD Ryzen 5, 16GB of RAM and 512GB SSD of storage.
• Recommended: 9th Gen Intel Core i7 or AMD Ryzen 7, 32GB of RAM and 1TB SSD of storage.

How to Apply

1

Choose Your Degree

Take your time and pick the course that excites you the most. You can always speak to our team before making a decision.

2

Check Admissions Criteria

Make sure you’ve got everything you need to apply by double-checking our admissions criteria. It won’t take long, we promise!

3

Apply

Fill out your application and hit submit! Our team will check over your application and get back to your as soon as possible.

4

Complete Enrollment

Wahey, you’re almost there!
We’ll just have to get a few final details before you’re officially an AIBI HE student.

FAQ’s

Will all classes be in-person?

Yes, all classes will be conducted in-person, and attendance is mandatory.

Note: This does not apply to domestic students who are enrolled in online study with AIBI HE.

How long is each academic year?

Each academic year includes three trimesters, each lasting 11 weeks of teaching followed by one exam week.

What will my class schedule look like?

We normally hold your classes on one afternoon and one evening on day one and in the evening on day two. For instance:
Monday: Classes from 2-5 and then 5.30-8.30
Tuesday: Classes from 5.30-8.30

Can I work while I study?

If you’re an international student, you can work 48 hours per fortnight during ongoing terms, and unlimited hours during holiday breaks.

Domestic students do not have a working cap. 

Where are your campuses located?

We have campuses located in Sydney, Melbourne, Brisbane, and Perth.

You can view our campuses online, or request an in-person campus tour.

Is attendance mandatory for orientation?

Yes, your attendance is mandatory for orientation.

You will receive more details on your orientation after you receive your COE. 

Course ID: CRS1401441
Accredited, renewal date 30/03/2030