Search
  • L3 & 4, 545 Kent Street, Sydney NSW 2000
  • +61 (2) 9020 8050
Australian Institute of Higher Education
  • About
    • Our Story
    • Governance & Leadership
      • Structure
      • Financial Standing
      • Tuition Assurance
    • Strategy
      • Vision & Mission
      • Values
      • People & Culture
      • Education
    • Policies & Procedures
    • Academic Profiles
    • Accreditation & Articulation
    • Approved Agents
    • News & Events
    • Contact Us
  • Students
    • International Student Prospectus
    • Student Handbook
    • Future Students
      • Why AIH
      • Testimonials
      • Living in Sydney
      • Living in Melbourne
      • Entry Requirements
      • Overseas Student Health Cover (OSHC)
      • Enquire Now
    • Current Students
    • Fees and Charges
    • Important Dates
    • Sydney Campus Facilities
    • Melbourne Campus Facilities
    • Wellbeing
  • Courses
    • Master of Business Information Systems (Cyber Security)
    • Master of Business Information Systems (Data Analytics)
    • Master of Business Information Systems
    • Master of Project Management
    • Master of Business Administration (Business Analytics)
    • Bachelor of Accounting
    • Bachelor of Business
    • Bachelor of Business Information Systems
    • Associate Degree of Business Information Systems
    • Diploma of Business Information Systems
  • Login
    • Student Login
    • Staff Intranet
  • Enquire
  • Apply
  • FAQs
  • Downloads
    • Download Course Guide
    • Agent Resources
  • About
    • Our Story
    • Governance & Leadership
      • Structure
      • Financial Standing
      • Tuition Assurance
    • Strategy
      • Vision & Mission
      • Values
      • People & Culture
      • Education
    • Policies & Procedures
    • Academic Profiles
    • Accreditation & Articulation
    • Approved Agents
    • News & Events
    • Contact Us
  • Students
    • International Student Prospectus
    • Student Handbook
    • Future Students
      • Why AIH
      • Testimonials
      • Living in Sydney
      • Living in Melbourne
      • Entry Requirements
      • Overseas Student Health Cover (OSHC)
      • Enquire Now
    • Current Students
    • Fees and Charges
    • Important Dates
    • Sydney Campus Facilities
    • Melbourne Campus Facilities
    • Wellbeing
  • Courses
    • Master of Business Information Systems (Cyber Security)
    • Master of Business Information Systems (Data Analytics)
    • Master of Business Information Systems
    • Master of Project Management
    • Master of Business Administration (Business Analytics)
    • Bachelor of Accounting
    • Bachelor of Business
    • Bachelor of Business Information Systems
    • Associate Degree of Business Information Systems
    • Diploma of Business Information Systems
  • Login
    • Student Login
    • Staff Intranet
  • Enquire
  • Apply
  • FAQs
  • Downloads
    • Download Course Guide
    • Agent Resources
HomeCoursesInformation TechnologyMaster of Business Information Systems (Cyber Security)

Master of Business Information Systems (Cyber Security)

Teachers
111497B – The course is accredited by TEQSA
Category:
Information Technology /
Free

Free

Duration: 2 years full time
Pre-requisites: nil
Assumed Knowledge: nil
Course Intake: January, February, March, May, June, July, August, September, October, November

COURSE DESCRIPTION

The Master of Business Information Systems (Cyber Security) is designed for professionals who wish to gain advanced technical skills and expertise in areas of cyber security. All organizations, regardless of size, increasingly use cyberspace to communicate with the world. Having reliable and secure systems and networks is a vital responsibility for every organisation. By incorporating the principles and knowledge of business information systems, the course provides students with the tools and techniques required to analyse, detect and securely confront challenges in the ever-evolving cyberspace. The course has been aligned with the comprehensive body of knowledge of Cyber Security (CYBOK) involving its eight areas concerning aspects of the human, organisational and regulatory aspects as well as the attack and defense technology aspects.

Click here for entry requirements

To view our Entry Requirements, click here.

WHAT YOU’LL LEARN

Structure

To complete the degree, you will need to pass fifteen Units (160 credit points). These units are delivered over two years. There are 13 units that are compulsory and 2 units which are electives.  The units and their descriptions are listed below. 

Admissions and Completion of Study

Students wishing to join the postgraduate courses should review the entry criteria and application procedures which are published in the Institute’s Course Guide.

A Master Course is awarded after completing 15 units of study.  Students wishing to exit with a Graduate Certificate of Business Information Systems may do so after the successful completion of 4 units.  A Graduate Diploma of Business Information Systems (Cyber Security) requires 8 units for completion.

Study Hours

As a student, you will need to allocate time to attend classes.  Generally, if you are studying full-time, you will have 12 hours of classes each week (for 4 units), on-campus.  In addition, you will need to set aside approximately 7-9 hours per week for each unit in your own time to complete assignments, readings, projects, workshop preparation and to prepare for tests and exams.

Assessment

Your studies at AIH will encompass practical, professionally focused, and project-based learning, so assessment types will vary.  You can expect them to include (the list is not exhaustive):

  • Individual and team-based projects
  • Case studies and presentations
  • Essays, assignments and reports
  • Exams
  • Practical assessments
  • Discussion forums
  • Participation in class including formative assessment activities

Learning Outcomes

  1. Demonstrate an advanced and integrated comprehension of business information systems (Cyber Security) theory and
  2. Investigate and design creative IS solutions for complex businesses.
  3. Research and critically evaluate the effectiveness of business information systems (Cyber Security) within specific.
  4. Provide business information systems (Cyber Security) recommendations to relevant.
  5. Exhibit Leadership, management, and interpersonal skills required by diverse teams working on business information.
  6. Apply knowledge and skills in response to current ethical dilemmas and professional issues in business information.

AQF LEVEL 9

Knowledge

Graduates at this level will have advanced and integrated understanding of a complex body of knowledge in one or more disciplines or areas of practice.

Skills

Graduates at this level will have expert, specialised cognitive and technical skills in a body of knowledge or practice to independently:

  • analyse critically, reflect on and synthesise complex information, problems, concepts and theories
  • research and apply established theories to a body of knowledge or practice
  • interpret and transmit knowledge, skills and ideas to specialist and non-specialist audiences

Application

Graduates at this level will apply knowledge and skills to demonstrate autonomy, expert judgement, adaptability and responsibility as a practitioner or learner.

Source adapted from https://www.aqf.edu.au/aqf-levels

WHAT UNITS YOU'LL STUDY

Level 4000

Semester 1 – 4 core units


MBIS4001 Information Systems Applications in Business

Unit Description

MBIS4001 Information Systems Applications in Business provides an introduction to the subject of information systems (IS) by presenting the most relevant concepts used to manage the integration of IS into business and society. The purpose of the unit is to facilitate proficient ways to simplify the use of technology in complex IS business environments and, by using case studies together with examples from industry, students will develop both a theoretical and a practical understanding of business information systems in order to achieve this.

More, this unit aims to build students’ awareness of the relationship between the functionality of IS and the requirements of business processes. In this way, students will learn how business organisations use IS to process data into information which can then be used for critical decision- making in the quest for competitive advantage.

MBIS4002 Database Management System

Unit Description

Database management systems are ubiquitous. Almost all organisations adopt them to organise, analyse, extract, transform and load data in order to make effective decisions. This positions MBIS4003 Database Management System as an essential unit as it introduces students to the fundamentals of relational databases. Unit learning outcomes are attained through authentic assessment; that is, the application of relevant concepts, techniques and methodologies related to database management along with practical exercises.

This unit also covers data modelling associated with using entity relationship diagrams and other advanced concepts such as structured query language (SQL) and procedural language (PL). These will be completed in the weekly workshops.

Additionally, data analysis, sharing options and database systems security concepts are covered. Distributed database management systems and data mining are also included in the unit’s topics.

MBIS4003 Software Development

Unit Description

In this unit, MBIS 4003 Software Development, students will learn the fundamentals of software development. Students will investigate a client’s application software problems, evaluate approaches, and then design a solution using a programming language such as Python. The unit takes students through the lifecycle of a software development project including writing specifications, testing and design. Students will gather and analyse customer software needs and requirements, learn core principles of programming, develop software specifications and use appropriate reference tools. Upon successful completion of this unit, students will have the ability to assess, understand and design code.

MBIS4004 Systems Analysis Design

Unit Description

MBIS4004 Systems Analysis Design covers the principles of analysis and design for information systems. Students will learn techniques in data requirements gathering and analysis along with methods to model data needs. Modelling of data will occur at the conceptual, logical, and physical levels along with an ability to compare and contrast different approaches.

Additionally, students will understand the importance and constraints imposed by the domain of the information system, along with business rules that guide the design of business information systems. This unit also addresses the role of functional dependencies and domain normalisation as part of requirements analysis and design using a user-centered design approach. At the end of this unit, students will have a sound understanding of the techniques required to model an information system.

Semester 2 – 4 core units


MBIS4006 Information Systems Security

Unit Description

MBIS4006 Information Systems Security provides a comprehensive study in the field of information systems security and an overview of professional, legal, and ethical issues faced by information system professionals in modern society. Students will demonstrate their ability to identify security threats to the infrastructure and information kept by commercial and government organisations which have economic value and are critical to public safety. Students will gauge the subsequent risks of various threats and develop risk management plans.

On successful completion of this unit, students will have obtained knowledge and skills necessary and sufficient to acquire the certification CSX Cybersecurity Fundamentals by ICASA (https://www.isaca.org/credentialing/itca/cybersecurity-fundamentals-certificate) and mitigate various security threats and attacks on contemporary information systems.

MBIS4008 Business Process Modelling

Unit Description

MBIS4008 Business Process Modelling facilitates students in examining and improving business operations. Informed by conceptual frameworks, students will use business process modelling software tools to make informed recommendations aimed at solving complex business problems as well as attendant improvements to organisational effectiveness and efficiency. This unit provides an opportunity for students to develop the knowledge and skills necessary and sufficient to analyse and design business processes in a variety of business contexts.

Pre-requisite: MBIS4004 (Co-requisite)

MBIS4009 Professional Practice in Information Systems

Unit Description

MBIS4009 Professional Practice in Information Systems educates students about the ethical, legal and social issues that they are likely to meet as future information system (IS) professionals. Viewed through the lenses of current IS practice and professional codes of ethics, these issues include data and privacy, confidentiality, cybercrime and internet fraud. On successful completion of this unit, students will have become aware of the ethical and legal obligations within IS and will have developed their negotiation and conflict resolution skills, as well as their critical thinking skills sufficient to make ethical and professional decisions in preparation for their future role as IS professionals.

MBIS4017 Cybersecurity Risk Assessment and Strategies

Unit Description

MBIS4017 Cybersecurity Risk Assessment and Strategies introduces students to the background of cyber security and cyber risk management. It covers a range of risk management techniques for cybersecurity based on established international standards (including ISO 31000) and industry best practices. Topics include information security, cyber security, cyber-risk management, cyber risk assessment (risk identification, analysis, evaluation and treatment) and how to address risk measurement, risk scales, uncertainty and high-consequence risk with low likelihood ­ in practice, as well as business continuity management.

Level 5000

Semester 3 – 4 core units


MBIS5004 Secure Programming and Hacking Countermeasures

Unit Description

MBIS5004 Secure Programming and Hacking Counter Measures introduces students to advance techniques of protection for software applications. This can be conducted by preparing countermeasures to mitigate vulnerabilities and exploitation against software applications.

The unit takes students through the system development life cycle starting from the analysis phase, design phase, development, and testing phase. For each phase, developers and cybersecurity professionals need to carry out some measurements and procedures to ensure the operation’s security. These procedures require some penetration testing tools, debug tools and mitigation tools. Real-world commercial and non-commercial testing and protection tools will enable students to work on projects making a difference in business, industry, government, and academia.

Pre-requisites: MBIS4003 Software Development

MBIS5005 Cyber Intelligence

Unit Description

MBIS5005 Cyber Intelligence introduces the students to comprehensive training and in-depth study in the field of digital/computer forensics. The unit combines training on both theoretical and practical aspects with up-to-date forensics software tools. The students will get the opportunity to build a firm foundation in this field and at the same time, have excellent hands-on experience that is needed in the current world.  The student will learn various techniques and methods used in recovering and producing evidence from electronic devices.

The subject starts by introducing the students to the operating systems, file types and data structures. The students will learn the data acquisition process, techniques to process evidence, digital forensics analysis and validation process, E-mail and social media investigations, electronic evidence collection process from mobile and computer equipment and so on. The other key areas of this unit include an introduction to digital forensics and understanding investigation, contemporary digital forensic issues and trends,  forensics process, and forensic validation of results,  processing crime and incident scenes,  E-discovery, guidelines, and standards, report writing for high-tech investigations, expert testimony and ethics, physical, environmental, and organisational considerations for deploying forensics computing initiatives, mobile device forensics and the Internet of Anything, Virtual Machine forensics, live acquisitions, and network forensics, challenges inhibiting a successful digital forensic investigation etc. This unit will contribute to preparing for professional certification as a forensic examiner GCFE(https://www.giac.org/digitalbadges ).

Pre-requisites: MBIS4002 Database Management Systems, MBIS4003 Software Development & MBIS4017 Cybersecurity Risk Management.

MBIS5006 Organisational Cyber Security

Unit Description

MBIS5006 Organizational Cyber Security introduces students to the creation and implementation of cybersecurity governance frameworks based on an understanding of business and risk management strategies. Students will become familiar with the standards and frameworks commonly used to ensure that business goals can be achieved safely. Students will learn to identify appropriate roles and responsibilities within the organization. Students will also learn a way to communicate strategies with the CEO and other business-related people as cybersecurity specialists.

Pre-requisites: MBIS4002 Database Management Systems & MBIS4003 Software Development.

MBIS5007 Penetration Testing & Cloud Security

Unit Description

MBIS5007 Penetration Testing and Cloud Security introduces students to various techniques of penetration testing and ethical hacking for the on-premises and over-the-cloud networks. The unit helps students understand how various networks are attacked so they learn how to protect them. Students learn penetration testing frameworks, pre-engagement, footprinting, and the most effective ways to identify a network’s weaknesses and vulnerabilities. Students learn the cybersecurity impact on business, policies and procedures. Also, the main emphasis is on the development of student’s skills to enable them to do proficient research and development works and studies in the cybersecurity discipline. On successful completion of this unit, students will be equipped with an in-depth understanding of relevant issues, attacks on massively interconnected systems, and the evolving approaches to improve the reliability of advanced services.

Pre-requisites: MBIS4003 Software Development & MBIS4006 Information Systems Security

Semester 4 – 1 core unit (double) and 2 out of the below 4 elective units


MBIS5019 Blockchain and Cryptocurrency (Elective)

Unit Description

MBIS5019 Blockchain and Cryptocurrency provides students with advanced topics in blockchain and its related contemporary domains such as blockchain for medicine, taxation, tourism and others. Cryptocurrency takes a part in this unit by providing students with practical examples of how to collect some distributed ledgers and how to conduct blockchain in a real-time environment.

Blockchain currently is implemented in many technologies and not only in Cryptocurrency. This unit will encourage students to think out of the box, so they can develop frameworks and concepts to apply blockchain in real-life examples. Students’ rational thinking will be equipped with major concepts of security such as cryptography methods including encryption types, hashing types and digital signatures.

Moreover, the unit aims at the development of students’ research skills and studies on these two recent areas blockchain and cryptocurrency.

Pre-requisites: MBIS4006 Information Systems Security

MBIS5021 Systems Security Professional (Elective)

Unit Description

MBIS5021 Systems Security Professional introduces students to the profession of a security officer in a business information systems environment. Students will analyse and apply content from the eight domains that comprise a Common Body of Knowledge (CyBOK) for information systems security professionals. This unit will also help students prepare for the Certified Information Systems Security Professional (CISSP) industry certification exam from the International Information Systems Security Certification Consortium (ISC2 –https://www.isc2.org/Certifications/CISSP) gaining initial recognition as an associate of ISC2.

MBIS5022 Computer Networks and Security (Elective)

Unit Description

MBIS5022 Computer Networks and Security unit introduces the students to the advanced network security concepts that are essential to developing students’ knowledge and functional skills in computer communication and security. Computer networks play an indispensable role in modern-day data communication across networks. Thus, hardening or making a robust computer network is a must to safeguard communication systems among multiple entities. However, the rise of cybercrimes and the variance of cyber attacks make it challenging for computer network professionals to build an effective defence.

In this unit, students will learn the functionalities of computer networks, how computer networks are targeted by attackers and how a robust defence can be built against attackers. The unit starts by focusing on the theoretical foundations, cryptographic functions and the topics related to the underlying concepts needed to understand the security issues in a networked environment. The students will be exposed to a wide range of techniques, tools and policies to effectively secure computer networks. The unit contents include networking concepts, cryptography and key management, digital signature and hash algorithms, firewalls, IDS/IPS, wireless security, web security, email security, access control mechanism, and legal and ethical implications of security assessment. The unit also focuses on applications of network security tools to prevent or detect attacks and the methods of hardening perimeter defence. This unit will assist the student to prepare for CompTIA network+ and security+ certification exams as well (https://www.comptia.org/certifications/network ).

Pre-requisites: MBIS4006 Information Systems Security

MBIS5016 Knowledge Management for IS (Elective)

Unit Description

MBIS5016 Knowledge Management for Information Systems discusses the history and different aspects of Knowledge Management (KM). It provides insight into the KM foundations, concepts, models, approaches, and techniques for effective knowledge management implementation. The main aim of this unit is to prepare and educate the students on key management discipline of focusing on the effective gathering, organization, storage, dissemination and flow of information and knowledge within organizations.

Knowledge Management for Information Systems emphasizes the interaction of knowledge and information policies and analyses how knowledge management policies are developed and used in organizations. Knowledge management introduces students to a range of strategies and practices used by an organization to identify, create, represent, distribute, and enable the adoption of insights and experiences. Such insights and experiences comprise knowledge, either embodied in individuals or embedded in organizational processes or practices. Students would be able to understand how to create an effective knowledge management strategy, concepts like knowledge mapping and how to build collaborative environments. This unit will consider two important aspects which are data analytics and cyber security.

Pre-requisites: MBIS4001 Information Systems Applications in Business & MBIS4008 Business Process Management

MBIS5015 Capstone Project (20 CP)

Unit Description

As well as providing students with further knowledge and skills, MBIS5015 provides the opportunity for students’ knowledge, skills and abilities gained throughout the Master of Business Information Systems program to be applied in this Capstone Project; especially those acquired in the prerequisite unit, MBIS5012 Strategic Information Systems.

Working in small teams, students will research a real-world problem and develop creative, practical, unique and relevant solutions. They will be required to undertake research that includes the application of theory and frameworks for problem identification, justification of approach, and the development and presentation of solutions. Students will also demonstrate their communication skills, technical competence and expertise. All groups will present their project outcomes at a showcase for the industry and academic members both within and outside of the Information Systems discipline. Student projects will vary, but all will require advanced research to support project development, reflection and technical output from the project.

Pre-requisites: MBIS5012*

* Students must firstly complete 72 credit points (8 units) before they are eligible to undertake the MBIS5015 Capstone Project.

About Instructors

111497B – The course is accredited by TEQSA

Free

Duration: 2 years full time
Pre-requisites: nil
Assumed Knowledge: nil
Course Intake: January, February, March, May, June, July, August, September, October, November

ABOUT US

Australian Institute of Higher Education offers quality higher education (tertiary) courses in Accounting, Business and Information Systems to students in Australia.
Australian Institute of Higher Education is a registered non self accrediting institution in New South Wales, Australia.

apply here

Quick links

  • FUTURE STUDENTS
  • CURRENT STUDENTS
  • WHY AIH
  • STUDENT LOGIN
  • STAFF LOGIN
  • FAQs

Contact Us

  • Sydney: Level 3 & 4, 545 Kent Street, Sydney NSW 2000 - Australia
    • Melbourne: Level 1, 20 Queen Street, Melbourne, VIC 3000 - Australia
    • +61 (2) 9020 8050
    • marketing@aih.nsw.edu.au

CAMPUS OPENING HOURS

Monday 08:30 am - 6:00 pm
Tuesday 08:30 am - 6:00 pm
Wednesday 08:30 am - 6:00 pm
Thursday 08:30 am - 6:00 pm
Friday 08:30 am - 6:00 pm
Saturday Closed
Sunday Closed
Footer logo
Copyright © 2022 Australian Institute of Higher Education.
TEQSA PRV12013 | CRICOS Provider Code 03147A | ABN 70 117 349 256. All rights reserved.
  • Privacy
  • Copyright & Disclaimer
  • Emergency Information
  • Contact Us