Bachelor of Information Technology (Cyber Security)
CRS1401742Make your impact and protect the future of our digital world
Cyber crime is one of the fastest-growing threats to businesses, governments and individuals worldwide. The demand for skilled cyber security experts has never been higher, and you could be one of them, making a real difference in keeping organisations safe and secure.
The Bachelor of Information Technology (Cyber Security) prepares you to protect critical systems from cyber attacks and safeguard sensitive information. You’ll gain the skills to detect and stop threats, manage network security, test for weaknesses and protect data.
Learning is hands-on, with access to modern labs, real-world cyber security scenarios and the latest tools. You’ll be guided by industry experts every step of the way.
You’ll graduate ready to design and implement advanced security strategies, lead cyber defence teams and bring the strategic mindset employers are looking for.
Your Accelerated Pathway to a Bachelor of IT
If you hold a Diploma in IT, you could complete your Bachelor of IT in just two years, accelerating your entry into critical roles.
Exit Point
After successful completion of two years, students can exit with an associate degree.
Further information about Chisholm's accreditation as a Higher Education provider can be found at Tertiary Education Quality and Standards Agency (TEQSA). Chisholm Higher Education College participates in surveys administered by Quality Indicators in Learning and Teaching (QILT).
-
Read more about this course
Course structure
To complete the Bachelor of Information Technology (Cyber Security) you must complete the 24 subjects in the Bachelor.
The Bachelor of Information Technology (Cyber Security) will require completion of 288 credit points composed of:
• 15 core information technology subjects (180 credit points)
• 6 core specialisation subjects (72 credit points)
• 3 elective subjects (36 credit points)
Indicative workload
As an IT student, your weekly workload for each subject you enrol in is approximately 9 hours per week. This is made up of a 3 hour class (delivered hybrid) plus 6 hours personal study time. For example, if you were to study full time, the weekly workload for this course would be 36 hours.
What You'll Learn: Mastering Future Cybersecurity Skillsets
This program will equip you with in-demand skills crucial for the next generation of cybersecurity professionals:
• AI-Driven Threat Intelligence & Defense: Understand how to leverage artificial intelligence and machine learning to predict, detect, and respond to advanced cyber threats. Learn to implement adaptive security protocols and automated defense mechanisms.
• Cloud Security Architecture: Master the principles of securing cloud environments, including IaaS, PaaS, and SaaS. Gain expertise in designing, implementing, and managing secure cloud infrastructures and applications.
• Identity and Access Management (IAM) & Zero Trust: Develop robust strategies for managing digital identities and implementing Zero Trust frameworks, ensuring that access to resources is continuously verified and strictly controlled.
• Security Automation & Orchestration (SOAR): Learn to automate security operations, orchestrate incident response workflows, and integrate security tools to enhance efficiency and effectiveness.
• Offensive Security & Red Teaming: Develop skills in ethical hacking, penetration testing, and red teaming exercises to proactively identify vulnerabilities and strengthen defensive postures.
• Data Privacy & Compliance: Gain a deep understanding of evolving data privacy regulations (e.g., GDPR, CCPA) and the technical measures required for compliance, focusing on data anonymization, encryption, and governance.
• Resilience Engineering & Disaster Recovery: Design and implement resilient systems that can withstand and quickly recover from cyberattacks and other disruptive events, ensuring business continuity.
How You'll Learn
You'll gain hands-on experience through a hybrid learning model, combining:
• Practical Labs: Engage in immersive, hands-on experiences in state-of-the-art cybersecurity labs at our Dandenong campus, simulating real-world threat scenarios.
• Applied Assessments: Demonstrate your mastery through practical projects including security incident simulations, penetration testing exercises, cloud security deployments, threat intelligence analysis, and comprehensive technical reports. -
Timetable
Full-time: On Campus, at our Dandenong Campus.
-
Learning outcomes
1. Synthesise and apply discipline-specific principles, methods and theories of information technology.
2. Formulate research-informed solutions to real-world problems in information technology.
3. Exemplify the technical and communication skills required to work in diverse information technology contexts both individually and as part of a group.
4. Negotiate and integrate ethical and social issues into professional practice.
5. Critically reflect on your own professional practice. -
Subjects - Year one
Database FundamentalsITS103
Semester one
This subject provides students with a solid understanding of database concepts, design principles, and practical skills required for effective database management. Students will explore the fundamental components of databases, data modelling techniques, and the SQL language to design, query, and manage relational databases.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Information SystemsITS101
Semester one
This subject provides students with a foundational understanding of information systems and their role in organisations. Students will explore the basic concepts, components, and processes involved in information systems, gaining knowledge of how information is collected, stored, processed, and utilised to support business operations.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Programming EnvironmentITS102
Semester one
This subject focuses on providing students with a solid foundation in programming languages, development environments, and tools. Students will learn to use various programming tools and gain practical experience in developing software solutions using industry-standard practices and methodologies.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Introduction to Cyber SecurityITS104
Semester one
Introduction to Cyber Security provides students with a comprehensive overview of the principles, technologies, and practices related to cyber security. Students will develop a foundational understanding of the threats, vulnerabilities, and countermeasures used to protect computer systems, networks, and data from cyber-attacks.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Cyber AlgorithmsITS202
Semester two
This subject provides students with a foundational understanding of algorithms and their applications in the field of cyber security. Students will explore various algorithmic techniques and learn how they are used to solve security-related problems, analyse data, and detect patterns in cyber systems.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Inside Information TechnologyITS201
Semester two
This subject is designed to provide students with an in-depth understanding of database management concepts, techniques, and technologies. Students will explore advanced topics in database design, administration, and optimisation.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Intermediate ProgrammingITS204
Semester two
Intermediate Programming builds upon the foundational programming skills and knowledge acquired in introductory programming courses. Students will further enhance their programming proficiency and problem-solving abilities by exploring advanced programming concepts and techniques. They will develop skills in writing modular and efficient code while working on real-world programming projects.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
-
Subjects - Year two
Discrete Maths and Critical ThinkingITS302
Semester one
This subject introduces students to critical thinking, informal logic, and the foundations of formal logic. Its purpose is to provide students with the basic tools of analytical reasoning, to enable a wide variety of career and study choices. In addition, this course introduces discrete mathematics and facilitates the presentation of mathematical thinking in both succinct written form and mathematical notation.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
System and Network AdministrationITS301
Semester one
This subject provides students with knowledge and professional skills to administer network servers. Students learn to manage resources, including server performance. They also gain capabilities for providing access to reliable information and services in a networked server environment. This subject also develops skills to be able to identify and diagnose possible problems and troubleshoot computer network administration systems using both Windows and Linux operating systems.
This practical "hands-on" subject will teach the essential skills of installing, using, and supporting operating systems and its administrative features.Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Software Engineering and Systems ArchitectureITS303
Semester one
The subject focuses on designing and developing software systems that meet user requirements. Within this context of designing systems, students will undertake activities including requirement analysis; system modelling; architectural design, and validation.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Object Oriented ProgrammingITS304
Semester one
This subject extends normal programming techniques to include object-oriented methodology. Students gain further knowledge and experience in Java programming and basic software engineering principles. Software engineering principles including parameters for characterising software quality and testing strategies are also introduced. Students will continue to identify and analyse of ethical issues that may arise during software development.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Cyber Security Operations ManagementITY403
Semester two
This subject examines the business risks generated by breaches of cyber security. Students study the technical skills required to build, predict and manage threats with a focus on both commercial and government (defence) industry standards. Students gain practical experience with the systems and strategies used in contemporary cyber security operations management.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Data AnalyticsITS401
Semester two
Data Analytics introduces the statistical principles used to make decisions where there is variability in numerical data. It examines the contemporary software packages used to solve problems, and to communicate data that informs conclusions and supports strategic decision making.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Human Factors in Cyber SecurityITY402
Semester two
This subject introduces students to finding and fixing vulnerabilities, encryption, intrusion detection and the management of cyber risks. The application of appropriate work practices that support good cyber security posture in software applications development, systems administration and information system professional areas are incorporated.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Vulnerability Assessment and Computer ForensicsITY404
Semester two
This subject introduces common white hat/black hat hacking techniques and exploits, as well as strategies for denying access to hackers. It examines computer forensics, as well as the skills required for data acquisition and the processing of crime scenes. It also investigates the ethical analysis and validation of forensics data.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
-
Subjects - Year three
Advanced Cyber Policy and Cyber LawITY501
Semester one
This course examines cyber security from legal, political and human resources perspectives. It examines public and private sector activities, government regulation and introduces relevant international laws and politics. Students evaluate the legal challenges of online activities and study legal requirements policies and cyber law within Australia and in Australian international jurisdictions Students study how security assessments operate within business operational constraints.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Business for Information TechnologyITE503
Semester one
This subject examines the business skills and language required to communicate effectively in writing with industry colleagues.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Incident/Crisis ManagementITY502
Semester one
In this subject, students investigate the theory and practice of managing an ICT incident or crisis. Students examine frequent and sophisticated cybersecurity threats managed by diverse organisations. This subject explores the crisis event from pre-crisis planning to post-crisis change management and organisation adaption to maximise effectiveness.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Industry Engagement 1ITS504
Semester one
This subject introduces students to project management principles, the role of a project manager, and the roles of the project team. Students examine project management methodologies, and the key activities required to initiate and plan a project in collaboration with a commercial enterprise. The subject focuses on the initiation and planning stages of a project as well as the tools and techniques required for its successful implementation.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Blockchain and CryptocurrenciesITE602
Semester two
This subject introduces blockchain and cryptocurrencies as used in the financial services industry. The rapid rise and fall in the value of Bitcoin will be examined in relation to other cryptocurrencies. Students assess and critique blockchain as an asset, review the dynamics of cryptocurrency markets as well as study the use of blockchain as a business solution.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Cloud Cyber SecurityITY601
Semester two
This course examines frameworks and techniques used to design, develop, and implement cloud computing systems. Students study how to set up cloud systems using vendor services, client portals, servers and virtual machines using the associated network infrastructure. They study diverse cloud computing models, security risks, threat models, and cloud-based security controls and measures. The course also addresses audit processes that ensure operational integrity and the protection of customer data in cloud-based systems.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Industry Engagement 2ITS604
Semester two
Building on Industry Engagement 1, students examine strategies for identifying the milestones and actions required to manage an IT project in a commercial enterprise. Students examine the effective stakeholder management and collaboration skills required to work as part of a team in a commercial environment.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
Drone TechnologiesITE603
Semester two
This subject examines diverse applications of drones, in taxis, delivery services, security, and surf floatation devices. Students study the requirements required of professional drone operator's accreditation by the Civil Aviation Safety Authority.
Assessment method:Can include a combination of online quizzes, tutorial exercises, individual and/or group assignments, and exams.
-
Admission requirements
• Completion of Australian Year 12 or equivalent discipline; and
Inherent requirements
• English: Academic IELTS 6.0 with no individual band below 5.5, or Chisholm recognised equivalent; and
• Must be at least 18 years of age at enrolment.Our inherent requirements are a guide to help you decide if a course is right for you.
If you are a student with a disability, long-term illness, mental health condition or are a primary carer of an individual with a disability, you can apply for support through our Equitable Learning and Disability Support team.
Reasonable Adjustments
Students with a disability or health condition are encouraged to contact Chisholm’s accessibility or student support service. Reasonable adjustments to support full and equal participation are available but must not compromise the academic integrity or safety standards of the course.
Acknowledgement
Students are required to review and consider their understanding and ability to meet the inherent requirement of the course at the point of enrolment and prior to undertaking placement. -
Practical placement
Across two third year subjects, students will participate in work integrated learning, where you will examine strategies for identifying the milestones and actions required to manage an IT project in a commercial enterprise.
-
Course pathways
Nationally recognised training Certificate IV in Information Technology Certificate IV in Cyber Security Diploma of Information Technology Bachelor of Information Technology (Cyber Security) Possible job outcome - help desk officer
- support web designer
- network support technician
- cyber security specialist
- IT Security Analyst
- cyber security specialist
- computer forensics
- network security administrator
- penetration tester
-
Fees
Indicative total course cost is $63,720. Total course cost is indicative based upon the 2026 tuition fee. Any increase in fees for subsequent years is not included in this value. Indicative annual tuition fees of $21,240. Indicative fees are based upon a student enrolling in 100% full time study load and does not reflect if subjects are repeated or advanced standing is granted.
This course is accredited by the Tertiary Education Quality and Standards Agency (TEQSA) and aligned to Australian Qualification Framework (AQF) Level 7.
Please note: Students may be required to undertake an assessment of their literacy and numeracy as part of their application process.
Chisholm is a Registered Training Organisation (RTO) and provides Nationally Recognised Training (NRT). This means you can be assured that our training will provide you with a qualification that is recognised and respected across Australia.
Chisholm courses are subject to minimum and maximum group numbers. Courses may be cancelled or postponed if minimum numbers are not achieved by the start date of the course. Courses may close prior to the start date if the maximum numbers are reached. In that situation, eligible applicants will be offered a place in the next available intake.