Bachelor of Computing (Cyber Security)
(B Comp) – MJRU-CYBSE
Bachelor of Computing (Cyber Security)
| wdt_ID | wdt_created_by | wdt_created_at | wdt_last_edited_by | wdt_last_edited_at | Location | Curtin Singapore campus |
|---|---|---|---|---|---|---|
| 1 | Study method | On-campus | ||||
| 2 | Study mode | Full-time or part-time | ||||
| 3 | Intake | July 2026 | ||||
| 4 | Duration | 2 years full-time (6 trimesters) or part-time equivalent |
Apply for the Trimester 2A July 2026 intake and receive a 50% scholarship
This course will equip you with high-level knowledge of computer systems and processes involved in software development and maintenance.
It covers aspects of modern computing, commencing with fundamental programming and theoretical knowledge; and followed by specialisation in cyber security.
You’ll use C and Java as the tools for learning core concepts such as object orientation and algorithms. Linux skills are taught throughout the course, starting with the basics and progressing to advanced topics.
This degree is designed to prepare you for careers in computing. As such, Curtin works closely with industry partners to optimise course content.
Cyber Security
This major focuses on the key concepts and challenges in data protection and computer software security.
You will examine both the high- and low-level practical aspects of computer security. High-level aspects include cryptography theory, data access policy development and security program management. Low-level aspects include computer forensics, network intrusion detection and incident handling.
Graduates have the skills to identify and implement appropriate applications for specific scenarios, as well as an understanding of issues related to the protection of individual rights.
Why study
If you are seeking a career in computing, this course is designed for you. You’ll learn industry-standard coding, with enough hands-on experience to be job ready, while also gaining the theory that will enable you to keep pace with the rapid change of the technology.
What you’ll learn
- Implement processes based on best practice when designing and implementing software
- Evaluate standard algorithms, techniques, and technologies relating to cyber security in a manner that is appropriate for a given problem and think critically and creatively to generate innovative and optimum theoretical and practical solutions
- Identify, evaluate and synthesise information from a range of computing sources to optimise the process of software design and implementation
- Document software and security activities and artefacts and communicate them in written and oral form to both technical and non-technical audiences and communicate effectively in ways appropriate to the audience and purpose
- Effectively use new and existing technologies, especially those relating to cyber security, recognising their advantages and limitations
- Sustain intellectual curiosity by updating their knowledge, engage in continuous training and research, and take control of their own learning and development
- Recognise and apply IEEE/ACM/ACS standards in the process of software design and development as well as the ACSC and ISO27000 series standards for cyber security
- Contribute to society using technology in a secure, ethical, legal, and socially responsible manner
- Demonstrate initiative, leadership and ethical practice when working independently and collaboratively