Adelaide University
Master of Information Technology (Cyber Security)
- Delivery: Face to Face
- Study Level: Postgraduate
- Duration: 24 months
- Course Type: Master's
Provides advanced knowledge in cybersecurity governance, risk and compliance (GRC).
Course overview
The Master of Information Technology (Cyber Security) builds fundamental IT and cybersecurity knowledge. Learn technical proficiencies to implement cybersecurity defences against evolving threats and attacks.
Engage in courses that will enhance your understanding of governance, risk management and compliance as well as business practices, network security and cybercriminal behaviour. Develop the knowledge needed as a cybersecurity specialist to be adaptable and flexible in a variety of situations. You’ll put these skills into practice in purpose-built computer labs and engage with industry experts in a real-world project, gaining further insight into the types of technologies changing our world.
Studying a degree in cybersecurity opens opportunities in a range of sectors, including defence, corporate and not-for-profits. You’ll graduate prepared to advise on the latest digital practices and protect companies from internal and external data breaches.
Key features
- Acquire the skills to protect organisations from cyber threats.
- Develop advanced knowledge in global cybersecurity practices.
- Build skills through real-world projects.
- The first four common courses in all Master of IT degrees provide flexibility to change specialisations.
- Gain practical skills in specialist computer labs.
Key facts
Mawson Lakes Campus
July, 2026
What you will study
Students must complete 96 units comprising:
- 78 units for all core courses.
- 18 units for all work-integrated learning.
Each course is worth six units.
Complete 78 units for all of the following:
- Information Technology and Systems Concepts
- Security Principles
- Data in Information Technology Systems
- Problem Solving and Programming Foundations
- Computer Networking
- Cyber Law, Ethics and Professional Practice in Cyber
- Human Factors and Cyber Criminal Behaviour
- Enterprise Security
- Security Architecture and Engineering
- Cloud Security
- Critical Infrastructure and Control System Security
- Security Operations and Risk Management
- Project Management for IT Professionals
Entry requirements
Admission criteria
To be eligible, an applicant must have achieved at least one of the following minimum entry requirements and demonstrate they fulfil any essential criteria for admission. In cases where there are more eligible applicants than available places, admission will be competitive with ranks based on the entry criteria.
- A completed bachelor's (AQF level 7) or bachelor's honours (AQF level 8) degree or equivalent from a recognised higher education institution; OR
- A completed nested or related graduate certificate (AQF level 8) or higher or equivalent from a recognised higher education institution.
Recognition of Prior Learning
Adelaide University is committed to recognising the contribution of students’ prior learning towards their program requirements.
Credit may be granted for formal, informal and non-formal learning, with guidance on eligibility provided to prospective students in a clear, transparent and publicly available credit framework.
Credit determinations will be:
- Evidence-based, equitable and transparent.
- Academically sound.
- Applied consistently, fairly and subject to review.
Credit will be granted for prior learning that is relevant and equivalent to the learning required for the courses for which credit is sought.
Credit will only be granted if it:
- Maintains the credibility and integrity of the program for which credit is sought.
- Does not contravene the conditions of the program’s professional accreditation.
- Does not disadvantage the student’s ability to achieve the expected course or program learning outcomes.
For more information, contact the university or visit its website.
Outcomes
Career outcomes
You may find yourself as the primary security contact, building frameworks for government agencies to protect against foreign threats and attacks. You might help large retail firms implement strategies to prevent the theft of personal customer data or you could become an ‘ethical hacker’, hired to test system weaknesses and find vulnerabilities before malicious hackers do.
With your professional qualification, you may find work as a:
- Cybersecurity Analyst
- Cybersecurity Consultant
- IT Auditor
- Governance, Risk and Compliance Analyst
As your career advances, you could find yourself taking on a role as a:
- Senior Cybersecurity Analyst
- Cybersecurity Manager
- Chief Security Officer
- Chief Information Officer
Fees and FEE-HELP
Indicative annual fee in 2026: $41,500 (domestic full-fee paying place)
Fee-paying programs require the full tuition fees for your study, which can be deferred partly or in full to a FEE-HELP loan. Where the duration of the program is less than one year, the total cost of the program is displayed.
A student’s fee may vary depending on:
- The number of courses studied per term.
- The choice of major or specialisation.
- Choice of courses.
- Credit from previous study or work experience.
- Eligibility for government-funded loans.
You may also need to pay the student services and amenities fee.
Student fees shown are subject to change. Contact the university directly to confirm.
FEE-HELP loans are available to assist eligible full-fee paying domestic students.


















