Australian Degree Course on Cyber War and Peace


 The University of New South Wales (UNSW) Canberra has announced it is opening a Masters in Cyber Security, Strategy and Diplomacy – Australia’s first ever course devoted to cyber war and peace. 

An online Masters degree provides students ability to understand operational, ethical and informational challenges for IT security

The Masters degree provides advanced interdisciplinary study into the political, military, diplomatic and higher-level management aspects of issues where cyber security, strategy and diplomacy interact, the university said.

The one-year online course will be offered by the university’s Australian Centre for Cyber Security (ACCS) and will commence in February 2016, with enrolments closing 20 January.

The degree is offered through online study to allow students from around the world to enroll in the program.

ACCS director, Professor Jill Slay, who will serve as one of the course teachers, has called on Australian and international corporations to continue their support for such education initiatives.

“We are working with industry, government and research leaders worldwide to build a national hub, a centre of excellence in cyber security education, research and professional development,” she said.

The new program will complement two existing UNSW Canberra Masters degrees – the Master of Cyber Security, which focuses on technical aspects of cyber security (for example, reverse engineering of malware) and the Master of Cyber Security Operations, which covers subjects such as cybercrime and cyber terrorism.

The university said the programs will be complemented by “red teaming” exercises led by adjunct staff with backgrounds in security and intelligence. UNSW Canberra is currently also home to Australia’s only university-based cyber weapons test range.

“It is widely accepted that the threats in cyber space are escalating, while responses to mitigate them are not able to keep up,” reads the course description.

“This program will provide students with the ability to understand the main policy, operational, ethical and informational challenges for security thrown up by the integration or penetration of advanced information technologies into all spheres of human activity.”


Ein News:       UNSW

 

« Cyber War Pre-emption Is The Key to Defense
Microsoft Leads FBI Coalition To Destroy Botnet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

SafenSoft (SnS)

SafenSoft (SnS)

SafenSoft delivers high-efficiency, low-impact proactive protection against malware, insider threats, and confidential data leakage.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Leadcomm

Leadcomm

Leadcomm is a Brazilian company focused on the distribution and integration of IT systems and security solutions for large companies.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

Guardz

Guardz

Guardz helps small and growing businesses to go from zero or low cyber protection to having comprehensive security – in the quickest and most straightforward way.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.