Graduate Certificate in Cyber Security
Keep today’s networked world secure
Prepare to thrive in the essential field of cyber security. This globally recognised postgrad IT qualification preps you with cyber security fundamentals. Get the skills you need to manage computer security, encryption, and authentication.
Australian Higher Education Loan Program (HELP)
- 13 Feb 22
- 03 Jul 22
- 30 Oct 22
QS RANKING 2022
Times Higher Education Ranking 2022
• Demonstrate a strategic overview of complex issues in cyber security
• Develop communication skills to engage effectively with technical and non-technical audiences
• Demonstrate an ability to appreciate the ethical considerations that inform judgements and decision making
• Work autonomously and effectively within a team
Our Graduate Certificate in Cyber Security will provide you with an understanding of cyber security fundamentals and programming, preparing you for a practical role within the industry. With a strong career focus, you’ll also be exposed to thought leadership from a range of cyber security professionals and complete mock job applications.
Graduates of this program are also able to articulate into RMIT's on-campus Master of Cyber Security, and are also eligible to apply for work experience placements with the Australian Defence Force Cyber Gap Program. In order to apply, you must be studying an eligible 12-month program. Further details can be found here.
Graduate with a globally recognised degree from a leading Australian university.
An Australian bachelor’s degree or equivalent in any discipline.
Work and Life
You may also be considered for the graduate certificate if you have a minimum 5 year’s full-time work experience in a related industry setting. Applicants will need to submit a CV.
English Proficiency Requirements
English Language Requirements
International students are required to provide current evidence of English language proficiency for admission to RMIT University. You can provide your results from one of these three options:
1. an accepted English language proficiency test, or
2. an accepted English language provider, or
3. a recognised Australian or international qualification. For detailed information on English language requirements and other proficiency tests recognised by RMIT, visit English language requirements and equivalency information.
Australian Student Visas
RMIT Online’s Graduate Certificate in Cyber Security does not meet Australian student visa requirements. For an Australian student visa, you must have an on-campus place in a program of study, such as our Master of Cyber Security. For more details on RMIT’s on-campus programs visit rmit.edu.au.
Develop the strategic and technical skills to solve complex cyber security issues and pursue a successful career in the industry.
Recommended Study Pattern
We recommend that you complete the courses in this program in the following order:
- Structures of Cyberspace
- Programming Fundamentals
- Introduction to Information Security
- Case Studies in Cyber Security
Choose your subjects
Structures of Cyberspace
Cyberspace refers to the hardware, software, algorithms, and protocols of digital communication. The ability to employ abstract thinking towards any problems within cyberspace is foundational to any cyber security professional. In this course, you’ll learn the mathematical tools and language needed to describe and interpret structures of cyberspace.
Programming skills represent a generic problem-solving ability and are considered essential for anyone involved in the development and maintenance of software systems. Programming skills are also vital for analysing software vulnerabilities, identifying malicious software, and other tasks required for cyber security analysts. This course will introduce you to foundational knowledge of computer systems, software interactions, conceptual building blocks for programming, and basic computer programming.
Introduction to Information Security
This course provides you with an overview of data and computer security and concentrates on technical and continuity management issues. The basic information security objectives such as data integrity, identification, message authentication, authorisation, validation and access control are examined. Cryptographic techniques and the basic philosophy of key management is also introduced. The ideas behind behind hacking, cracking and social engineering will be discussed in the context of ethics and their place in information security.
Case Studies in Cyber Security
In this course, you’ll be able to apply the knowledge and skills obtained to study further concepts in information security, communicate and interpret ideas related to information security, and work in small groups. You’ll also choose topics of interest, therefore completing a broader coverage of information security topics.