Australian Degree Course on Cyber War and Peace


 The University of New South Wales (UNSW) Canberra has announced it is opening a Masters in Cyber Security, Strategy and Diplomacy – Australia’s first ever course devoted to cyber war and peace. 

An online Masters degree provides students ability to understand operational, ethical and informational challenges for IT security

The Masters degree provides advanced interdisciplinary study into the political, military, diplomatic and higher-level management aspects of issues where cyber security, strategy and diplomacy interact, the university said.

The one-year online course will be offered by the university’s Australian Centre for Cyber Security (ACCS) and will commence in February 2016, with enrolments closing 20 January.

The degree is offered through online study to allow students from around the world to enroll in the program.

ACCS director, Professor Jill Slay, who will serve as one of the course teachers, has called on Australian and international corporations to continue their support for such education initiatives.

“We are working with industry, government and research leaders worldwide to build a national hub, a centre of excellence in cyber security education, research and professional development,” she said.

The new program will complement two existing UNSW Canberra Masters degrees – the Master of Cyber Security, which focuses on technical aspects of cyber security (for example, reverse engineering of malware) and the Master of Cyber Security Operations, which covers subjects such as cybercrime and cyber terrorism.

The university said the programs will be complemented by “red teaming” exercises led by adjunct staff with backgrounds in security and intelligence. UNSW Canberra is currently also home to Australia’s only university-based cyber weapons test range.

“It is widely accepted that the threats in cyber space are escalating, while responses to mitigate them are not able to keep up,” reads the course description.

“This program will provide students with the ability to understand the main policy, operational, ethical and informational challenges for security thrown up by the integration or penetration of advanced information technologies into all spheres of human activity.”


Ein News:       UNSW

 

« Cyber War Pre-emption Is The Key to Defense
Microsoft Leads FBI Coalition To Destroy Botnet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

CyberQP

CyberQP

CyberQP (formerly Quickpass Cybersecurity) provide Privileged Access Management built for MSPs. Our system is designed to reduce ransomware and social engineering attack risks.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics Services (CDFS)

CDFS is Australia’s premier supplier of digital forensic tools, industry-embedded training and certification to Law Enforcement, Government, and Corporate Enterprise.