Australian Degree Course on Cyber War and Peace


 The University of New South Wales (UNSW) Canberra has announced it is opening a Masters in Cyber Security, Strategy and Diplomacy – Australia’s first ever course devoted to cyber war and peace. 

An online Masters degree provides students ability to understand operational, ethical and informational challenges for IT security

The Masters degree provides advanced interdisciplinary study into the political, military, diplomatic and higher-level management aspects of issues where cyber security, strategy and diplomacy interact, the university said.

The one-year online course will be offered by the university’s Australian Centre for Cyber Security (ACCS) and will commence in February 2016, with enrolments closing 20 January.

The degree is offered through online study to allow students from around the world to enroll in the program.

ACCS director, Professor Jill Slay, who will serve as one of the course teachers, has called on Australian and international corporations to continue their support for such education initiatives.

“We are working with industry, government and research leaders worldwide to build a national hub, a centre of excellence in cyber security education, research and professional development,” she said.

The new program will complement two existing UNSW Canberra Masters degrees – the Master of Cyber Security, which focuses on technical aspects of cyber security (for example, reverse engineering of malware) and the Master of Cyber Security Operations, which covers subjects such as cybercrime and cyber terrorism.

The university said the programs will be complemented by “red teaming” exercises led by adjunct staff with backgrounds in security and intelligence. UNSW Canberra is currently also home to Australia’s only university-based cyber weapons test range.

“It is widely accepted that the threats in cyber space are escalating, while responses to mitigate them are not able to keep up,” reads the course description.

“This program will provide students with the ability to understand the main policy, operational, ethical and informational challenges for security thrown up by the integration or penetration of advanced information technologies into all spheres of human activity.”


Ein News:       UNSW

 

« Cyber War Pre-emption Is The Key to Defense
Microsoft Leads FBI Coalition To Destroy Botnet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.