³ÉÈËÍ·Ìõ

Skip to Main Content
People working in computer lab

Cyber Security and Forensics

Qualification

Bachelor of Information Technology in Cyber Security and Forensics

Are you interested in a career that requires you to be on the front lines of protecting your organisation from cyber threats?

Globally, cybercrime has rapidly ascended to the top of the list of national security priorities. The main problems for IT security experts are improving data security and minimising the effects of a network or database cyber attack.

Our program is designed to give students the tools they need to succeed in the field of cyber security and forensics.

Our Bachelor of Information Technology course is accredited by the Australian Computer Society (ACS).

Duration and course structure

8 trimesters, to be completed in 3 years, or 6 trimesters to be completed in 2 years (fast-track), 24 units, 72 credit points

Intake dates

January, May, September

Mode of delivery

On campus

Fees

AED 174,600 for the entire course (24 units).

Tuition fees are inclusive of VAT.

Why choose a Bachelor of Information Technology in Cyber Security and Forensics in Dubai?

Information technology is one of the fastest growing fields in the world. From cyber security to digital forensics, there are many exciting options for students who want to get involved in this field. The Bachelor of Information Technology in Cyber Security and Forensics at ³ÉÈËÍ·Ìõ offers you the opportunity to gain practical experience and skills in these areas through a combination of on-campus lectures, hands-on laboratory work and industry placements.

  • Cutting-edge technology: Our research facilities include state-of-the-art equipment that allows us to stay ahead of industry trends by providing cutting-edge training opportunities for our students and staff, as well as access to leading edge research projects from around the world. The IT Innovation Hub, for example, is a state-of-the-art facility that is fitted out with the latest mixed and augmented reality equipment, an operational data centre, and high performance computing capabilities. With all these resources at your fingertips, you will be able to develop skills that are highly sought after by employers across all industries.
  • You’re an ambitious young professional, and we want to help you get where you want to go. You can’t get a degree in cyber security and forensics without the proper training. And you can’t get that training without the right tools. That’s why we’re offering you access to great scholarships like the Westpac Young Technologists Scholarship Program. The scholarship program is a great way to get your foot in the door with an industry leader.
  • Do you want to be able to work in technology but aren’t sure which path to follow? If so, then the Bachelor of Information Technology in Cyber Security and Forensics at Murdoch is the perfect degree for you. The IT major allows you to choose between seven specifically designed majors which you can combine into double majors to increase your skill set and career options.

Career opportunities

  • Cybersecurity engineer
  • Cryptographer
  • Forensic computer analyst
  • Pen tester

Course structure

Spine Units 9 cp

      • ICT111 | 3 cp | Cybersecurity Fundamentals
      • MSP200 | 3 cp | Building Employability Skills
      • COM203 | 3 cp | Consulting and Freelancing

Computer Science Major 24 cp

Required Units 15 cp

      • ICT171 | 3 cp | Introduction to Server Environments and Architectures
      • ICT279 | 3 cp | Security Architectures and Controls
      • ICT280 | 3 cp | Information Security Policy and Governance
      • ICT 378 | 3 cp | Cybersecurity and Incident Response
      • ICT387 | 3 cp | Ethical Hacking and Software Security

Specified Electives 9 cp

Select 3 cp from one of the sets below:

Set 1
MAS183 | 3 cp | Statistical Data Analysis
OR
MAS162 | 3 cp | Discrete Mathematics and Logic
Students considering a double major with Computer Science, or Artificial Intelligence and Autonomous Systems, must complete MAS162, which may require prerequisites.
Set 2
ICT145 | 3 cp | Python Programming for Everyone
OR
ICT167 | 3 cp | Principles of Computer Science
Students considering a double major with Computer Science, or Artificial Intelligence and Autonomous Systems, must take ICT167.

Set 3
ICT206 | 3 cp | Intelligent Systems
OR
ICT284 | 3 cp | Systems Analysis and Design
Students considering a double major with Computer Science must take ICT206.

Recommended double majors

  • Computer Science
  • Business information systems

Professional recognition

This course is accredited at the Professional level with the .

English language entry requirements

International students must be able to demonstrate English language proficiency before being admitted to this course.

See requirements
Salih Ismail image

Faculty Profile – Information Technology

Discipline Lead – Dr. Salih Ismail

Dr. Salih is an industry-experienced academician. He holds a PhD from Heriot-Watt University in Security of Cloud Computing. He also graduated with a distinction in MSc in Computer Systems Management from Heriot-Watt University and received a BSc (Hons) in Information Technology from the University of Bedfordshire. He holds a Fellowship (FHEA) and a Senior Fellowship (SFHEA) from the Higher Education Academy (UK).

His research interests include Cyber Security, the Internet of Things, Cloud Computing, and the Semantic Web. He has published across various disciplines in some top journals and conferences. His research collaborations have extended globally to receive funding for his projects.

Before academia, he worked in the industry in various posts, including IT Manager, Technology Officer, and Database Administrator, and sat on many advisory boards for tech start-ups. Throughout his career, Dr. Salih has demonstrated a strong commitment to shaping the next generation of leaders and thinkers. He has consulted on multiple mission-critical projects in Cyber Security for both Governments and Industries. He has received various awards showcasing his excellence in Cybersecurity, including the prestigious Dubai Electronic Cyber Security Innovation Award.

Back to Top