Australian Degree Course on Cyber War and Peace


 The University of New South Wales (UNSW) Canberra has announced it is opening a Masters in Cyber Security, Strategy and Diplomacy – Australia’s first ever course devoted to cyber war and peace. 

An online Masters degree provides students ability to understand operational, ethical and informational challenges for IT security

The Masters degree provides advanced interdisciplinary study into the political, military, diplomatic and higher-level management aspects of issues where cyber security, strategy and diplomacy interact, the university said.

The one-year online course will be offered by the university’s Australian Centre for Cyber Security (ACCS) and will commence in February 2016, with enrolments closing 20 January.

The degree is offered through online study to allow students from around the world to enroll in the program.

ACCS director, Professor Jill Slay, who will serve as one of the course teachers, has called on Australian and international corporations to continue their support for such education initiatives.

“We are working with industry, government and research leaders worldwide to build a national hub, a centre of excellence in cyber security education, research and professional development,” she said.

The new program will complement two existing UNSW Canberra Masters degrees – the Master of Cyber Security, which focuses on technical aspects of cyber security (for example, reverse engineering of malware) and the Master of Cyber Security Operations, which covers subjects such as cybercrime and cyber terrorism.

The university said the programs will be complemented by “red teaming” exercises led by adjunct staff with backgrounds in security and intelligence. UNSW Canberra is currently also home to Australia’s only university-based cyber weapons test range.

“It is widely accepted that the threats in cyber space are escalating, while responses to mitigate them are not able to keep up,” reads the course description.

“This program will provide students with the ability to understand the main policy, operational, ethical and informational challenges for security thrown up by the integration or penetration of advanced information technologies into all spheres of human activity.”


Ein News:       UNSW

 

« Cyber War Pre-emption Is The Key to Defense
Microsoft Leads FBI Coalition To Destroy Botnet »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

Viasat

Viasat

Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Sectra Communications

Sectra Communications

Sectra successfully develops and sells cutting-edge solutions in the expanding niche segments of medical IT and cybersecurity.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

Gray Swan

Gray Swan

Gray Swan is the safety and security provider for the AI era, founded by world leading experts in the AI safety and security space.

ENKI WhiteHat

ENKI WhiteHat

ENKI WhiteHat is an offensive security specialist, preemptively addressing cyber threats from a hacker’s perspective.