Master of Information Systems Security - Distance

Speak without obligation to Charles Sturt University Wagga Wagga Campus

To contact you must accept the privacy policy

Comments about Master of Information Systems Security - Online

  • Objectives
    Achievement of IT industry certifications from major IT vendors such as Cisco, CompTIA, Check Point and Microsoft are included as an integral part of CSU’s Master of Information Systems Security.
  • Academic title
    Master of Information Systems Security
  • Course description
    Graduate Certificate in Information Systems Security

    About the course

    The aim of these courses is to provide professionals in the IT industry with advanced courses of study in information technology management that are current, relevant and integrate industry certification in this field. These courses incorporate significant components of industry training, including formal industry-stream certification by Microsoft and/or Cisco, as well as traditional higher education.

    Upon completion of the Master degree, graduates will possess:

        * an informed and reflexive perspective on IT security issues
        * advanced skills in the design, implementation and management of secure computer networks
        * skills in IT risk management issues
        * skills in identifying and producing solutions to threats that endanger information system resources
        * competence in determining common best practices to secure a computing enterprise
        * at least one high-level industry certification from Microsoft, Cisco or Check Point in the IT security area
        * problem solving skills and methodologies when troubleshooting and documenting complex computing security problems
        * the ability to analyse complex client business security requirements and select appropriate solutions
        * skills in the development of leading edge security solutions that meet customer business objectives for functionality and performance

    Students may elect to exit from the Master degree after completion of four specified subjects and graduate with the Graduate Certificate in Information Systems Security.

    Upon completion of the Graduate Certificate course graduates will be able to satisfy a subset of the objectives of the Master course, depending on which subjects have been completed.

    Professional recognition

    The Australian Computer Society (ACS) accredits courses in Information Technology to verify that they meet professional standards in terms of content, staff skills, teaching facilities and quality assurance. CSU has the highest level of accreditation, that is accreditation at the professional level.


    The Master degree and the Graduate Certificate make up an articulated set of courses, and credit is awarded in the Master degree for subjects completed in the Graduate Certificate.


    A) Each of the industry streams will be treated as a package of 48 points of credit. Since this represents the maximum credit possible in the course, any students who have already studied any of the four core subjects will be able to undertake subjects from the restricted elective list as subject substitutions.

    B) Students in multiplatform stream with the industry certificate, Certified Information System Security Professional (CISSP) may claim one subject equivalent credit for an ITI5** subject in the multiplatform stream. However, there is no credit available for CISSP qualification for students in Microsoft Security Stream since all ITI5** subjects in this stream are required to obtain an MCSE: Security certificate.

    Residential school

    There are no residential school requirements for this course.

    Graduation requirements

    To graduate, students must satisfactorily complete 96 points, which includes the completion of the relevant industry stream certificate (for which credit of 48 points is given) for the Master degree or 32 points, which includes the completion 16 points of relevant industry stream subjects for the
    Graduate Certificate.

Other programs related to information systems

This site uses cookies.
If you continue navigating, the use of cookies is deemed to be accepted.
See more  |