There is a more recent version of this academic item available.

Overview

The Bachelor of Computing and Cyber Security (Chief of the Defence Force) is a three-year program at pass level. If eligible, students who have completed the pass degree, may be admitted to an additional one-year Honours program (Program 4517). The program is designed to build the graduate attributes and skills … For more content click the Read More button below. The BCCS(CDF) introduces students to Computer Science fundamentals and builds practical system design and development and cyber security skills. The program builds from foundational topics like programming and systems analysis and design through applications of sophisticated algorithms and techniques for system development and implementation. The focus on Cyber Security develops a broad understanding of cyber security defence, offense and analysis techniques and approaches. The Bachelor of Computing and Cyber Security (CDF) program develops students’ lifetime skills including creativity, problem-solving ability, critical thinking and communication skills that will be useful not only in a Cyber Security or Cyber war environment but in all professions. It prepares students to deal with technical issues in a computing environment. It develops intellectual and practical problem-solving skills through studies across a range of computing specialisations.

Learning Outcomes

1.
On completion of this program, graduates will be able to apply computational solutions to different verticals in government and industry, by modelling, simulation and integration, following agreed architectures, design standards, patterns, and methodologies, in professional and multi-disciplinary collaboration with identified stakeholders.
  • Professionals
  • Global Citizens
2.
On completion of this program, graduates will be able to articulate the theoretical underpinnings of information confidentiality, integrity, and availability, including attack lifecycles, cryptography, security controls, ethics, legal aspects, risk assessment, incident response, and standards.
  • Scholars
  • Professionals
3.
On completion of this program, graduates will be able to develop software with appropriate security controls, security implementations, and testing frameworks, implement and configure cyber defensive and offensive technologies, and conduct basic network risk assessments, all in accordance with current best practice and in professional collaboration with the relevant stakeholders.
  • Leaders
  • Professionals
4.
On completion of this program, graduates will be able to provide comprehensive security in existing and new network architectures through intelligent placement of multiple defensive and offensive security controls and systems, based on the different threat profiles faced and the different protections and limitations posed by each.
  • Professionals
  • Leaders
5.
On completion of this program, graduates will be able to articulate ICT disciplinary theories and trends in the current information age, including insights into the ethical and social issues of computing.
  • Professionals
  • Scholars
6.
On completion of this program, graduates will be able to competently demonstrate critical problem-solving and design skills, together with modern project management techniques, in the context of ICT projects.
  • Leaders
  • Scholars
  • Professionals
7.
On completion of this program, graduates will be able to work in a productive, ethical, and professional manner – either independently or in teams – applying life-long learning to remain contemporary and competent in the ICT discipline.
  • Professionals
  • Global Citizens
8.
On completion of this program, graduates will be able to apply the framework of computational thinking and knowledge of computability, complexity theory, and information representation to describe and manipulate fundamental computing knowledge concerning software development and programming languages, operating systems, computer hardware, networks and approaches to refining and maintaining efficiency and security.
  • Scholars
  • Professionals
9.
On completion of this program, graduates will be able to design, implement, verify, validate, document, deploy and explain computational solutions as algorithms coded in high-level programming languages, using conventional standards and tools to meet well-described outcomes.
  • Scholars
  • Professionals

Program Structure
144 Units of Credit:

Students must complete 144 UOC as a standalone program.

The Bachelor of Computing and Cyber Security (CDF) students must complete a minimum 144 UOC comprising:

Core courses - 102 UOC
Discipline Elective courses - 24 UOC
Free Elective courses - 6 UOC
General Education courses - 12 UOC

Free Electives

Students must take at least 6 UOC of the following courses.

Admission Requirements

Entry Requirements

Related Programs

Related Programs

Bachelor of Computing and Cyber Security - BCompCybSec4427 - Computing and Cyber Security

Program Requirements

Progression Requirements

Pathways

Honours Programs

Bachelor of Computing and Cyber Security (Honours) - BCompCybSec (Hons)4517 - Computing and Cyber Security (Honours)

Post Graduate

Master of Cyber Security - MCyberSec8628 - Cyber Security
Master of Cyber Security Operations - MCyberSecOps8629 - Cyber Security Operations
Master of Cyber Security, Strategy and Diplomacy - MCSSD8631 - Cyber Security, Strategy and Diplomacy

Recognition of Achievement

University Medal

Award of Pass with Distinction

Additional Information

Program Rules

1. To qualify for the degree of Bachelor of Computing and Cyber Security (CDF), a student shall normally be enrolled for a minimum of six sessions and gain a minimum of 144 UOC (normally 24 UOC in each full time semester). This is composed of 126 UOC of core courses, 6 UOC of free elective courses, and 12 UOC of General Education courses.

2. A student completing a Standard Program shall complete courses, in the years prescribed, for all Computing and Cyber Security (CDF) students as set out in the relevant schedule.

3. A student completing a Non-Standard Program shall, subject to the Requirements of Rule 7 (below), timetabling requirements and the approval of the appropriate Head of School, be permitted to enrol in any one year in courses selected from more than one year of the relevant schedule.

4. Before a student's enrolment will be accepted for any course, the student must have completed the relevant pre-requisite courses shown in the Course Handbook, except where the Course Authority for the appropriate course approves otherwise.

5. A student for enrolment for the degree of Bachelor of Computing and Cyber Security (CDF) shall hold an Australian Tertiary Admission Rank (ATAR) or equivalent of no less than 98.

6. To qualify for the degree of Bachelor of Computing and Cyber Security (CDF), a student shall normally achieve a sessional Weighted Average Mean (WAM) of 85.

7. To remain within the Bachelor of Computing and Cyber Security (CDF) program, a student shall normally maintain a sessional Weighted Average Mean (WAM) of 80.

8. A student of the program Bachelor of Computing and Cyber Security may, at the discretion of the Head of School, transfer to the degree of Bachelor of Computing and Cyber Security (CDF) upon completion of 24 UOC with a WAM of 80 or greater in Semester 1 or 2 of the Year One program.

9. Usually, a student who does not comply with the requirements of Rule 7 (above) shall be transferred to candidature for the degree of Bachelor of Computing and Cyber Security, although exceptions may be made at the discretion of the Head of School. Such review will occur at the end of each semester.

10. Rule 9 (above) shall not usually be invoked for students with potential graduand status.

Program Fees

At UNSW fees are generally charged at course level and therefore dependent upon individual enrolment and other factors such as student's residency status. For generic information on fees and additional expenses of UNSW programs, click on one of the following:

Pre-2019 Handbook Editions

Access past handbook editions (2018 and prior)