Master of Applied Technologies-Computing in Cybersecurity and Networking
The Master of Applied Technologies - Computing in Cybersecurity and Networking program ...
Mt Albert
INTAKE: Jul & Feb
The Master of Computing - Cybersecurity program at Unitec Institute of Technology is designed to provide students with comprehensive knowledge and skills in cybersecurity practices, preparing them for careers in securing digital systems and networks.
Curriculum: The curriculum covers a wide array of cybersecurity topics, including but not limited to network security, cryptography, ethical hacking, cybersecurity frameworks, incident response, risk management, and secure software development. It combines theoretical knowledge with practical applications to address real-world cybersecurity challenges.
Research Focus: The program encourages students to engage in research projects focusing on current cybersecurity issues and emerging technologies. Research areas may include cyber threats analysis, digital forensics, security analytics, and the development of innovative cybersecurity solutions.
Industry Engagement: Unitec Institute of Technology fosters strong connections with industry partners, enabling students to participate in internships, industry-sponsored projects, and workshops conducted by cybersecurity professionals. This engagement facilitates hands-on experience and exposure to industry-relevant practices and tools.
Global Perspective: The Master's program emphasizes a global perspective by exploring international cybersecurity standards, cross-border cyber threats, and best practices in securing systems on a global scale. Students gain insights into the global cybersecurity landscape and its interconnectedness.
Mt Albert
IELTS 6.5
NZD 32500
Postgraduate Entry Requirements
Academic Qualifications: Applicants for postgraduate programs usually need a bachelor's degree or an equivalent qualification from a recognized institution. The entry requirement may specify a minimum score of 60% or higher in the previous academic degree.
English Language Proficiency:
Students must provide:
Work experience: Some postgraduate courses may require relevant work experience in the field.
It is important to note that meeting the minimum entry requirements does not guarantee admission, as the university considers factors such as availability of places and competition for the program. Additionally, some courses may have higher entry requirements or additional selection criteria, such as interviews or portfolio submissions.
Unitec Institute of Technology offers various scholarships to support the academic endeavors of international students. These scholarships aim to recognize academic excellence, promote diversity, and assist students in their educational pursuits.
Merit-Based Scholarships: Awarded to students with outstanding academic achievements, these scholarships often consider GPA, achievements, or academic potential.
Need-Based Scholarships: Aimed at assisting students with financial need, these scholarships provide support to those facing economic challenges.
Subject-Specific Scholarships: Offered to students excelling in specific fields or disciplines, encouraging excellence and innovation in those areas.
Diversity Scholarships: Intended to promote diversity and inclusivity, these scholarships encourage applications from students of diverse backgrounds, cultures, or regions.
Graduating with a Master of Computing - Cybersecurity from Unitec Institute of Technology can lead to various rewarding career opportunities in the field of cybersecurity.
Cybersecurity Analyst/Consultant: Professionals can work as cybersecurity analysts or consultants, evaluating security measures, identifying vulnerabilities, and recommending solutions to safeguard systems and networks.
Network Security Engineer: Graduates may pursue roles as network security engineers, responsible for designing, implementing, and managing secure network infrastructures.
Penetration Tester/Ethical Hacker: Individuals can specialize as penetration testers or ethical hackers, conducting authorized simulated cyberattacks to identify weaknesses and enhance security measures.
Information Security Manager: Professionals may work as information security managers, overseeing an organization's overall security posture, managing security policies, and leading incident response teams.
Security Architect: Graduates can become security architects, designing and implementing secure systems and networks in compliance with industry standards.
Forensic Computer Analyst: Professionals may specialize as forensic computer analysts, investigating cybercrimes and collecting digital evidence for legal proceedings.