Advanced Cyber Security Engineering Research Centre

PhD in Cyber Security

The Centre welcomes applications from prospective PhD students wishing to broaden their career opportunities and expand their research knowledge and skills in cybersecurity. To express your interest please  email your resume and proposal , together with certified translated copies of your undergraduate transcripts and research proposal.

Some possible topics for research with the centre include:

  • Cloud Security
  • Virtualisation Security
  • Internet of Things (IoT) Security
  • Software Defined Networks Security
  • Data Centric Security
  • Data Privacy
  • Big Data & Applications Security
  • Machine Learning Technologies
  • Software Security
  • Malware & Security Attack
  • Industrial Control Systems Security
  • Cyber Physical Systems Security
  • Security Models, Architectures & Protocols

Our Graduate Research Office will assist you with details on scholarships and applying to become a research student at the University of Newcastle.

Professor Vijay Varadharajan

Professor Vijay Varadharajan

The University of Newcastle acknowledges the traditional custodians of the lands within our footprint areas: Awabakal, Darkinjung, Biripai, Worimi, Wonnarua, and Eora Nations. We also pay respect to the wisdom of our Elders past and present.

Are you visiting our site from South Asia ? Head to our dedicated page with all the information you need to study at the University of Newcastle. Close

您是否在中国访问我们的网址? 前往 专属页面 ,查询你在纽卡斯尔大学学习所需的所有信息。 Close

Fully Funded PhD Scholarships available now!

We have multiple, fully-funded PhD scholarship opportunities, at the Macquarie University Cyber Security Hub, for domestic (AU citizen and Permanent Resident) and international candidates interested in cybersecurity, data privacy and artificial intelligence. The potential research topics include: Real-time cyber threat prevention mechanisms, Personal information leakage in natural language processing models, Classification of cyberthreats robust against obfuscation, Security, privacy and fairness in machine learning, and Secure and private multiparty data analysis. Backgrounds in Computer Science and related fields with relevant research experience.  Scholarship components: The scholarship consists of a Tuition Fee Offset and a Living Allowance Stipend. The value and tenure of the scholarship is a “MQRES” full-time stipend rate of $28,854 per annum (in 2022 tax exempt for up to 3 years - indexed annually).

For more info, please visit

Please DM or email ( [email protected] ) us for further information.

Contacts: Prof.  Dali Kaafar , Dr  Hassan Jameel Asghar , Dr  Muhammad Ikram

  • Follow UNSW Canberra on LinkedIn
  • Follow UNSW Canberra on Twitter
  • Follow UNSW Canberra on Facebook
  • Follow UNSW Canberra on YouTube

Doctor of Philosophy (PhD)

cyber security phd programs australia

Apply your theory-driven research to the real world 

At UNSW Canberra, we’re committed to providing unique opportunities for graduates and researchers to bring their vision to life to address some of the world’s most complex research challenges.  

A Doctor of Philosophy (PhD) is an internationally recognised qualification that allows you to explore an in-depth research project that you’re passionate about. You'll be challenged to undertake intensive, independent research and make a significant and original contribution to your chosen specialisation.  

Our state-of-the-art facilities and superior partnerships, together with the strength of our research focused community creates exceptional career development opportunities for higher degree research (HDR) students. Opportunities exist in academic, research, and professional roles in Australia and internationally.  

Throughout your research program, you'll work closely with academic supervisors who are progressive thinkers and leaders in their field. At the end of the program, you must produce an original thesis that provides evidence of independent thought, critical analysis, and expert knowledge in your discipline.  

Explore your research options

View our PhD openings and be inspired to join a diverse group of scholars and research students making positive impacts worldwide.

cyber security phd programs australia

Aerospace Engineering

cyber security phd programs australia

Civil Engineering

cyber security phd programs australia

Computer Science

cyber security phd programs australia

Cyber Security

cyber security phd programs australia

Economics & Management

cyber security phd programs australia

Electrical Engineering

cyber security phd programs australia

International & Political Studies

cyber security phd programs australia

Mathematics & Statistics

cyber security phd programs australia

Mechanical Engineering

cyber security phd programs australia

Oceanography

cyber security phd programs australia

Project Management

cyber security phd programs australia

Southeast Asian Social Inquiry

cyber security phd programs australia

Systems Engineering

cyber security phd programs australia

Scholarships & funding

cyber security phd programs australia

Find a research supervisor

cyber security phd programs australia

Access to world-class teaching & research facilities

School contacts.

Student Enquiries E:   [email protected]

Postgraduate Research Coordinator Dr Katie Moon E:   [email protected] T:  (02) 5114 5694

General enquiries E:   [email protected]

Postgraduate Research Coordinator (Admissions) Dr Daryl Essam T:  (02) 5114 5130 E:   [email protected]

Student Enquiries E:   [email protected]

Postgraduate Research Coordinator Dr Christina Spittel T:  (02) 5114 5069 E:   [email protected]

General enquiries E:   [email protected]

Postgraduate Research Coordinator Dr Timothy Trudgian E:   [email protected] T:  (02) 5114 5026

Code PHDINFCY

Cyber security phd unit set, creative thinkers made here..

QILT - Quality Indicators for Learning and Teaching

A great student experience

As an ECU postgraduate, you can expect the best overall student experience of any public universities in Western Australia. More about QILT .

The Good Universities Guide - teaching quality

A 5-star postgrad experience

Our postgraduate students have rated us 5 stars for their overall experience in the latest Good Universities Guide . More 5-star ratings included: skills development, student support and teaching quality.

THE World University Rankings Top 100 Young

One of the world's young guns

We're ranked one of the world's best universities under 50 years old , and we've already established a global reputation for such a young institution.

About this PhD Unit Set

ECU has Australia's largest cyber security research and education program. Cyber Security research at ECU is supported by the Security Research Institute (SRI).

With a reputation as one of the leading digital security and forensic groups in world, the SRI offers a range of PhD opportunities in the areas of cyber security. With an internationally recognised team of researchers, the SRI delivers immediate and high impact outcomes. Two of our academic staff are also members of Interpol's Cyber Crime Experts Group. ECU is an Australian Computer Society (ACS) Centre of Expertise in Security, has been recognised by the Australian Federal Government as an Academic Centre of Cyber Security Excellence (ACCSE), and operates as the headquarters of the federally funded Cyber Security Cooperative Research Centre (CyberSec CRC). Security research at ECU concentrates on: Aviation security; Computer and digital forensics; Critical infrastructure security Cyber security Human factors of security Information warfare; Network and wireless security; Physical security; Risk management; Specific postgraduate research topics related to the above topics are developed in conjunction with the postgraduate coordinator or potential supervisor.

It is desirable that all applicants contact a potential supervisor to discuss their research project before applying. Information about ECU's Research Institutions, Centres and Supervisors can be found in the school brochures listed on the Applying for a Research Degree’ website or the staff contact page of the relevant School.

Availability & Campus

Important notes.

Candidates enrolled in the Doctor of Philosophy Integrated (J42) may be required to attend classes on more than one campus to complete the research training component of the course.

Candidates are expected to meet regularly with their supervisors as part of the supervised independent research component of the course.

Career Opportunities

Employment opportunities.

Academic and research organisations; Information and technology organisations; Government agencies; Oil, gas and mining organisations; Cyber Security organisations

Possible future job titles

Research Officer, Research Scientist, Research Fellow

This PhD Unit Set can be studied in the following courses

  • Doctor of Philosophy
  • Doctor of Philosophy (Integrated)

Experiences

The important things.

Things you should know about if you're thinking about studying here.

Course Entry

There's more than one admission pathway into an ECU course. It depends on what you've studied already, or your work or life experience.

Fees & Scholarships

Course tuition fees can change, but we can give you an estimate of your costs. If you're eligible, a scholarship or student loan can help too.

Applying for a course is a fairly simple process, especially if you have scanned copies of qualifications, your resume or other paperwork, ready to upload.

ECU Experience

Starting a course is an exciting and sometimes daunting time, so we make a massive effort to ensure you get all the support you need to have a positive experience.

ip target image

  • Skip to main content
  • Australasia
  • Computer Science and IT
  • Computer Science
  • UNSW Sydney - University of New South Wales

You've reached your limit of 10 Favourites

Doctor of Philosophy (PhD) - Cyber Security UNSW Sydney - University of New South Wales " class="blu_btn vst_lnk visit_up" id="visitWebLinkId" onclick="ga('send','event', 'Interaction', 'Webclick', 'UNSW Sydney - University of New South Wales>' ,1, {'nonInteraction': 1});cpeWebLinkClick(this,'290408','72233','9','101475','N','3','57672288','UNSW Sydney - University of New South Wales','E,E1','','1','58');gaInsightLog(this,'290408>','72233','Australia','101475','N','null','null');GAForCkieOnFormSubmit('Visit Website','Course Details');" target="_blank" rel="noopener" href="https://www.hotcoursesinternational.com/study/cpe-track.html?url=https%3A%2F%2Fwww.unsw.edu.au%2Fin%2Fstudy%3Futm_source%3DIDP%26utm_medium%3Dreferral%26utm_campaign%3DIDP">

Study options.

  • International

What will I learn?

The Doctor of Philosophy (PhD) degree is offered in all faculties of the University of New South Wales and encourages initiative and originality in research. Candidates should make a significant and original contribution to knowledge in their field.

This program involves a minimum of three years full-time study. Students undertake supervised research leading to the production of the thesis.

The length of a doctoral thesis normally should not exceed 100,000 words of text and should be submitted for examination within 4 years of full-time study.

Some advanced coursework may also be prescribed.

Which department am I in?

Full time (3 years).

Please check with institution

*Price shown is for indicative purposes, please check with institution

27 May 2024, 9 September 2024

Canberra Campus

Australian Defence Force Academy,

Northcott Drive,

Australian Capital Territory,

2600, CANBERRA, Australia

Entry requirements

For international students.

As a general guide, the UNSW entry requirements for the degree of Doctor of Philosophy are as follows:

A candidate for the degree shall have been awarded an appropriate degree of Bachelor with Honours from the University of New South Wales or a qualification considered equivalent from another university or tertiary institution at a level acceptable to the UNSW Canberra Higher Degree Committee.

In exceptional cases an applicant who submits evidence of such other academic and professional qualifications as may be approved by the Committee may be permitted to enrol for the degree.

English Language Requirements:

IELTS: 6.5 overall (min. 6.0 in each subtest); TOEFL IBT (Internet Based): 90 overall (min. 23 in writing, 22 in reading, listening and speaking); Pearson (PTE - Academic): 64 overall (min. 54 in each subtest); C1 Advanced Cambridge: 176 overall (min. 169 in each subtest); C2 Proficiency Cambridge: 180 overall (min. 180 in each subtest); UNSW Global University English Entry Course (UEEC): Successful completion with a minimum overall grade of C+ and a minimum grade of C in the writing component.

*There may be different IELTS requirements depending on your chosen course.

About UNSW Sydney - University of New South Wales 4 Reviews

UNSW Sydney - University of New South Wales

UNSW Sydney is a world-leading teaching and research powerhouse, ranked in the top 20 universities worldwide.

  • Equal 19th in QS World University Rankings 2024
  • #1 university in Australia for Employment Outcomes
  • #1 in Australia for International Research Network
  • Among top world universities for 42 subjects (QS 2023)

Close

Cyber Security Cooperative Research Centre (CSCRC) Graduate Scholarships

The Cyber Security CRC (CSCRC) aims to inspire the next generation of cyber security professionals through working with some of the best cyber security researchers in Australia, and engagement with the CSCRC Industry and Government participants.

The goals of the CSCRC is to be an independent and collaborative centre where industry, government and research partners work together to create new products, services and systems that deliver a secure and resilient national cyber security capability, and enhance cyber expertise for the nation, making Australia a safer place to do business. CSCRC also aims to attract, inspire, mentor and develop the next generation of cyber security professionals by offering the best and brightest students scholarships through our participating universities.

The field of cyber security aims to secure the confidentiality, integrity and availability of data by preventing unauthorised access or disruption to systems. It is primarily a domain of computer science, but there are range of problems related to cyber security that are best solved by cross-disciplinary approaches to the subject. Graduates are welcome to apply for a PhD or Masters scholarship in cyber security based on one of the 9 available themes.  See full details here .

Eligibility :

Have completed a Bachelor of degree with a 1st class Honours, or a Masters degree that contains a significant (and relevant) research component with equivalent academic performance in Computer Science or similar.

Be assessed by the Adelaide Graduate Research School as meeting all conditions for admission to the Masters or Doctoral program. For more information about the entry requirements for Higher Degrees by Research at the University of Adelaide, please visit the Adelaide Graduate Research School’s website .

Generous scholarships are on offer $37,000 to $50,000 per annum.  Please see CSCRC Information sheet for full details.

Enquiries :

For confidential discussion regarding this position, please contact Professor Ali Babar, School of Computer Sciences on Telephone +61 8 8313 4478 or Email [email protected]

The potential applicants should discuss their qualifications and research interests with the University of Adelaide’s lead researcher in the CSCRC Professor Ali Babar.  For detailed feedback on your qualifications and Expression of Interest (EOI), you are encouraged to send the following documents:

  • Your CV (2 pages)
  • A research proposal closely aligned with one of the CSCRC Research Themes
  • Copies of your academic transcripts
  • A one-page statement outlining which CSCRC Scholarship Category (outlined above) you are seeking to apply for, and why you would be a suitable CSCRC Scholar  

Further information on the formal application process, entry requirements for Higher Degrees by Research and admission and scholarship deadlines, please visit the Adelaide Graduate Centre website .

School of Computing and Information Systems

  • Cyber Security
  • Academic Centre of Cyber Security Excellence (ACCSE)

Key research areas

Our research capability is focused on key challenges, including detecting attacks in large, complex systems, using formal methods to design platforms that are resilient to attack, designing robust controllers for critical infrastructure, and providing a legal framework for the governance of cyber operations that span a range of jurisdictions.

  • Cybersecurity management

Network security and analytics

Privacy and government, verification and formal methods.

As connectivity is increasing exponentially and an ever increasing proportion of existence is being carried out via networks, ensuring the safety and security of our networked infrastructure is an increasing concern.

In 2017, the Commonwealth Government selected the University of Melbourne and Edith Cowan University to share $1.9 million in Federal Government funding as Australia’s first Academic Centres of Cyber Security Excellence.

The Centres are a key pillar in leading Commonwealth efforts to build the cybersecurity expertise and job-ready skills needed by Australian industries.

The Centre will provide a focal point to further research relating to cybersecurity. Prof Chris Leckie will lead the Centre which is developing a training and research agenda that brings together expertise from the technical disciplines, law and the social sciences.

The Centre will consolidate the long-term teaching and research focus on cybersecurity at the University of Melbourne. The Centre will also become a driver for increase collaboration across industry and the community to improve cybersecurity.

A key aspect of the Centre will be to develop the skills pipeline for cybersecurity in Australia. This activity, working closely with AustCyber , will ensure the Australian economy will have access to cyber security graduates and expertise. This will help strengthen existing industries and critical infrastructure, but also assist to build new jobs and businesses in this rapidly emerging sector.

Outreach and engagement

Industrial partnerships and community outreach are two important areas of our focus. We are working on building relationships and collaboration with a wide variety of industry partners, including government agencies and commercial businesses. We carrying out a range of outreach activities with local schools and the community to increase diversity in the cybersecurity area.

Community outreach

We have active outreach programs that are mainly driven by the desire to increase diversity in computing and cybersecurity space.

Industry partnerships

We are capable of delivering customised professional and executive level training courses on both cyber awareness and cyber technology.

Video enhanced storytelling in cyber security

We produce high quality cyber security training videos to suit an array of audiences.

The University of Melbourne has repeatedly demonstrated ability to leverage its world-leading research and scholarship and this is reflected in our approach to our undergraduate and graduate education. Our cyber security education is based on teaching broadly based fundamentals at the undergraduate level, followed by specialised programs at the Masters level. This has led to the commencement and support of a large cohort of PhD students who are currently undertaking research in a range of cyber security topics.

We currently offer two Masters by coursework programs that include cyber security related subjects

  • Master of Information Technology
  • Master of Information Systems

These courses were designed in consultation with leading IT decision-makers and have experienced strong student growth in recent years. Both qualifications offer elective streams in a range of areas, each underpinned by core content related to IT strategy, governance and security.

A significant initiative of the University is to expand our academic cyber security education program by introducing a specialised Master of Information Technology (Cyber Security) stream. This will introduce additional subjects that build on our research strengths, and address the demand for key skills in industry.

cyber security phd programs australia

Advisory Board

The Centre places a major emphasis on industry collaboration in identifying the needs of industry, the expectations of the skills of graduates, and the opportunities for industry involvement in research and teaching. ACCSE has an Industry Advisory Board, which consists of leading cyber security professionals from banks, consultant firms, and government agencies.

  • Life in Melbourne
  • Alumni profiles
  • Casual tutor, demonstrator, marker and project team supervisor opportunities
  • CSIRAC’s vital statistics
  • CSIRAC chronology
  • CSIRAC design
  • How did CSIRAC work?: Storage
  • How did CSIRAC work?: Console
  • CSIRAC uses
  • CSIRAC: Designers
  • The music of CSIRAC
  • CSIRAC emulator
  • Jurij Semkiw
  • CSIRAC and computer history links
  • The Last of the First, CSIRAC: Australia’s First Computer
  • CSIRAC photo gallery
  • History of computing in the department
  • Starting the Department of Information Systems
  • Early internet
  • Memories of the department
  • Programming
  • Student life in the department
  • Women in computing
  • Submission Guidelines
  • Colloquium Photos
  • Program_open
  • Participation and Awards
  • Volunteers and Judges
  • CISDC 2022 Photos
  • 2019 CIS Doctoral Colloquium
  • 2018 CIS Doctoral Colloquium
  • 2017 CIS Doctoral Colloquium
  • 2016 CIS Doctoral Colloquium
  • 2015 CIS Doctoral Colloquium
  • 2014 CIS Doctoral Colloquium
  • 2013 CIS Doctoral Colloquium
  • Keynote speaker
  • Colloquium sponsors
  • Call for papers
  • Application_closed
  • Submission_info
  • Program_pending
  • Registration_pending
  • Cyber attack maps to underpin better strategic responses
  • Surgeons gain implant expertise with virtual training
  • Informatics analyses value in digital health technologies
  • Data contrasting highlights changing use of city
  • Online community designed to support mental health for young people
  • Satisfaction score to improve quality of internet search results
  • Supply chain scheduling keeps automated mining operations on task
  • Combined data adds power to decision-making
  • New algorithms help interpret vision loss from digital images
  • Host a student intern
  • Mentor our students
  • Student industry projects
  • Become a guest speaker
  • CIS-EEE Seed Funding
  • How data can prevent overdiagnosis
  • CIS - IE 2022 Research Collaboration Seed Funding
  • 2021 news and events
  • 2020 news and events
  • 2019 news and events
  • CIS-ME 2023 Seed Funding round
  • CIS-IE 2023 Seed Funding round
  • Graduate Reseachers
  • Graduate Researchers
  • Digital Health
  • Research projects
  • Undergraduate programs
  • Graduate coursework programs
  • Graduate research programs
  • Industry based learning
  • Programming proficiency test
  • Study with CIS
  • Become a tutor
  • Publications
  • Mining and optimisation
  • Automated planning languages
  • Foundations of human-agent collaboration
  • People-oriented software engineering
  • Explainable artificial intelligence
  • Multimodal human-agent collaboration
  • Industry engagement
  • User Experience Lab
  • Interactive Technologies Lab
  • Engineering Workshop
  • Telstra Creator Space
  • News and Events
  • Graduate researchers
  • Adaptive learning technologies
  • Ageing and avatars
  • AI-enabled assistance for strategic planning in games
  • Wearable technology for arm monitoring in health
  • Augmented fitness
  • Augmented learning environment for physiotherapy education
  • Biometric Mirror
  • Changing views
  • Citizen Heritage
  • Cognition-aware systems
  • Cognitive interaction
  • Completed projects
  • Connecting learners for collaboration across diverse communities
  • Cross-community information systems
  • Crowdsourcing
  • Death and the Internet
  • Deceptive AI
  • Designing for scale
  • Designing technologies for indigenous knowledge
  • Digital commemoration
  • Digital domesticity
  • Conceptualising and measuring digital emotion regulation
  • Emerging technologies for enrichment in old age
  • Ethics and digital games
  • Evaluation of natural user interfaces in query auto-completion
  • Examining the ‘digital’ in hybrid digital boardgames
  • Exploring complex data sets using highly engaging environments
  • Exploring natural user interfaces during meal times
  • Getting well and being present
  • Growing old and staying connected
  • HandLog: tangible interactions for game input and rehabilitation
  • Improving Vitamin D status and related health in young women
  • Insertable technology for human interactions
  • Interactive displays
  • Interactive spaces and media architecture
  • Kinecting with orang-utans
  • Mediating intimacy
  • Mobile fieldwork and learning
  • Multimodal human–agent collaboration
  • Music streaming and algorithmic recommendation
  • Near-infrared spectroscopy
  • Orygen Virtual World Project
  • Promoting student peer review in Australian tertiary education
  • Personal sensing for mental health and wellbeing
  • Pholiota Unlocked
  • Reading on ubiquitous devices
  • Smart Garden Watering
  • Smartphones for science
  • Social gaming events: Warhammer 40K
  • Social networking sites for ambivalent socialisers
  • Social play in immersive gaming environments
  • Social robots and virtual assistants for older people
  • Sociophysical interactions
  • Social Orientated Requirements Engineering
  • Spectating eSports and Let’s Play
  • Supporting social interactions for video calls in the home
  • Teleconsultation: enhancing interactions between clinicians and patients
  • Virtual co-presence
  • Virtual Reality and climate change communication
  • VR therapy for youth mental health
  • Robot Assisted Learning and Rehabilitation
  • XR for Human-Robot Interaction
  • Social and Domestic Drones
  • Human-Centred Agent Learning
  • Child of Now
  • Smart Spaces
  • Ubiquitous computing
  • Digital health
  • Digital nature
  • Novel interactions
  • Design for ageing
  • Games and play
  • Social computing and communities
  • Human information interaction
  • Human-Robot Interaction
  • Past seminars 2020
  • Past seminars 2019
  • Past seminars 2016–2018
  • Past seminars 2011–2015
  • Past seminars 2006–2010
  • Past seminars 2004–2005
  • HCI programs for potential students
  • HCI subjects
  • Masters projects
  • Potential PhD students
  • Process science and technology
  • Business analytics and decision making
  • Innovations in the digital society
  • Current Students

The Australian National University

National Security College

search scope

  • Short programs
  • News & events
  • Policy Engagement
  • Master of National Security Policy
  • Scholarships

ANU National Security College on Twitter

You are here

NSC biosecurity overlay image

Degree structure

Scholarships and fees, further information.

Program Coordinator

The National Security College PhD program develops experts in security policy with strong research skills.

As a PhD student you’ll work with increased independence, under the direction of a supervisory panel of experts in the field. Your research will make an original and important contribution to human knowledge, research and development. Each PhD student is supervised by an academic with relevant expertise.

Admission requirements

To gain admission to the NSC PhD program, applicants need to have at minimum an upper second class (H2A) honours degree (or its equivalent) in security studies, international relations, political science or another cognate discipline.

Please note that it is a Crawford School requirement that you have confirmation from two proposed supervisors, one from the National Security College and another from the National Security College or Crawford School, confirming that they will supervise you for the duration of your candidature.

A PhD degree normally requires the completion of a thesis (around 100,000 words) over a period of three to four years (full-time). The thesis must make an original and substantial contribution to the academic literature, and it must demonstrate the student’s capacity to situate their research in the discipline of security studies.

Application process

Candidates interested in undertaking PhD study at the NSC should:

Review the general information on applying to undertake PhD study at ANU .

Review the NSC website to check the research interests of academic staff

Send an Expression of Interest to the academic staff member who you have identified as a possible supervisor for your PhD project.

Information in your Expression of Interest should include:

  • A proposed thesis topic (be as specific as you can) of relevance to national security policy
  • A preliminary thesis proposal of no more than 8-10 pages (see below)
  • The name of a potential supervisor from among the NSC academic staff
  • A copy of your academic transcript(s)
  • A CV including evidence of any work experience
  • A sample of your academic writing (published or unpublished)
  • A statement on whether your ability to undertake PhD study is dependent on being awarded a scholarship
  • The timeframe you envisage for commencing and completing your PhD study at ANU

As part of your application, you are required to prepare a PhD research proposal. The proposal can be used in part to: - Assess the merits of your application (for general acceptance and scholarships where relevant), - The fit of your research topic to NSC, Crawford and the ANU. - Guide you in your studies. Don’t worry though - the proposal is non-binding and often students revise their proposal when they commence their studies. In preparing your proposal to undertake your PhD in the NSC at Crawford, please consider:

Title - A precise and informative description of the project.

Viability During COVID-19 - All applicants should include a section in their application detailing the viability of their project in the context of COVID restrictions. This section should either: (a) explain how the project is not dependent on travel and/or fieldwork and therefore feasible regardless of restrictions in these domains; or (b) provide a 12-month plan outlining how the project will proceed if the current restrictions on fieldwork and travel continue. - Applicants should discuss the viability of their research project under COVID restrictions with their proposed supervisors prior to submitting the application.

Introduction - Context to set the scene as to why the research matters to national security - State the overall aims of your research - A clearly focused statement of the overall purpose of the proposed research (ie, why is it important?)

Research questions &/or hypotheses - The questions that the proposed research will address and/or the hypotheses that will be tested. What cases and/or time periods and why these?

Review of relevant literature - What is the current state of play in your topic area? - What gaps are in this literature that you can address? - Define any key terms/concepts you are drawing on - You need to demonstrate that are aware of the wider literature published internationally on this and related topics and that your research can engage on-going debates. Therefore, you need to provide a preliminary review of the key research that has already been carried out in the field and identification of the gaps in the literature that the proposed research aims to fill.

Proposed methods - An explanation of what type of data will be required to answer the research questions, or test the hypotheses and how the data will be collected and analysed. - Do include some comment on the feasibility of the project. Consider noting if you have any relevant skills or networks to help access the data needed. If not (and it is ok if not!), how will you acquire these skills and access (for example, through undertaking the compulsory methods coursework etc)?

Contribution - What is the contribution you are trying to make with your research? This may be a contribution to the literature, methods and/or policy.

Timetable - An indication of how the research will be carried out over the duration of a full-time (3 years for PhD) or part-time (6 years for PhD) candidature. Note that we generally encourage PhD students to be full time.

Resources - An indication of the funding that will be required over the course of the candidature (eg, for fieldwork) as well any special materials or training that may be necessary for the successful completion of the project.

Institutional fit - A statement on why NSC is suitable for your project and an indication of potential supervisors/advisors.

Reference list - Include here a bibliography of any literature you have cited in the proposal. Proposals at Crawford can be between 5-10 pages and usually at least 7-8 pages in length. Please take the above structure as a suggestion only. Different proposals will address the above factors to different degrees but all will have to address all of them to some degree. We also understand that some projects may be best presented in a different structure. For this reason, we encourage applicants to develop their proposal in consultation with their prospective supervisors.

  • If it is established that an appropriate academic supervisor is available, lodge a formal application through ANU . You can apply on an admission-only basis or for admission and scholarship.

More information on applying to undertake PhD study in the ANU College of Asia & the Pacific is available on the Graduate research page of their website.

English language admission requirements for student’s policy

Unless an applicant:

  • is a citizen of Australia; or
  • a citizen of one of the countries listed in the English Language Admission Requirements for Students policy and whose studies were conducted entirely in English; or
  • successfully completed prior full-time study in the medium of English for a minimum of two (2) years in one of the countries listed in the relevant ANU policy, no more than two (2) years prior to the date of the application to ANU

Applicants for this PhD program will normally require either:

  • an IELTS overall band score 6.5 with a score of at least 6.0 in all components; or
  • a minimum TOEFL score of 570 and a Test of Written English (TWE) score of 4.5 (paper-based test); or 230 and an Essay Test score of 4.5 (computer-based test); or a score of 80, with a minimum of 20 in Reading and Writing and 18 in Speaking and Listening_ _(internet-based test).

English language tests must have been taken no more than two (2) years before the date of application.

After candidates have contacted NSC academics and have been approved to submit an online application, they should submit an application to the National Security College and not Crawford school of Public Policy.

TPR presentations are designed to provide the committee, PhD cohort and others with the important contours of the proposed research project. The presentation should be no longer than 45 minutes, and should cover (1) the motivating research question/puzzle, (2) a mastery of the relevant literature(s) to demonstrate the existence of the puzzle, (3) the theoretical contribution to resolve it and (4) how empirical evidence will be used to do so. The presentation may also, if relevant, want to (5) dwell on the potential policy implications of the research. While all the details of this may take longer than 45 minutes, candidates should select the most important parts to ensure that the presentation stays within that time and allows adequate time for committee and audience questions.

All applicants should include a section in their application detailing the viability of their project in the context of COVID restrictions. This section should either (a) explain how the project is not dependent on travel and/or fieldwork and therefore feasible regardless of restrictions in these domains; or (b) provide a 12-month plan outlining how the project will proceed if the current restrictions on fieldwork and travel continue. Applicants should discuss the viability of their research project under COVID restrictions with their proposed supervisors prior to submitting the application.

James Mortensen's picture

James Mortensen

Lecturer and HDR Program Coordinator

Contact details

Room: 2.156

Sue Thompson's picture

Sue Thompson

Associate Professor

cyber security phd programs australia

Apply to study at the NSC in 2023

cyber security phd programs australia

Postgraduate Studies Information Evening

James Mortensen, PhD candidate at the National Security College

Infinite hoops in life and quidditch – Q&A with ANU quidditch coach

Doctoral scholar probes Australia's Africa policy

Doctoral scholar probes Australia's Africa policy

National security college hdr travel grant.

The National Security College HDR Travel Grant provides additional research funding for new or existing domestic higher degree by research students from the College to undertake fieldwork or attend conferences.

Other scholarships

ANU offers a wide range of scholarships to students to assist with the cost of their studies.

Eligibility to apply for ANU scholarships varies depending on the specifics of the scholarship and can be categorised by the type of student you are.

Specific scholarship application process information is included in the relevant scholarship listing.

For further information

Australian Government logo

Updated:   27 March 2024 / Responsible Officer:   Head of College, National Security College / Page Contact:   Web administrator

  • Contact ANU
  • Freedom of Information

+61 2 6125 5111 The Australian National University, Canberra CRICOS Provider : 00120C ABN : 52 234 063 906

Group of Eight Member

The service you are accessing is either under high load or has detected unusual activity from your network location.

To protect this service from abuse please complete the challenge below to continue.

What code is in the image? submit

Your unique support ID for this request is: 96619576153807892.

If you see this challenge frequently or believe you are seeing it in error please record this ID and contact the Deakin University IT Service Desk . Additional information is available from the IT Knowledge Base .

Cybersecurity Guide

From scholar to expert: Cybersecurity PhD options

In this guide

  • Industry demand
  • 2024 rankings
  • Preparation
  • Considerations
  • School listings

The cybersecurity landscape is not just growing—it’s evolving at a breakneck pace. And what better way to stay ahead of the curve than by pursuing a PhD in cybersecurity?

This advanced degree is no longer confined to the realm of computer science. Today, it branches into diverse fields like law, policy, management, and strategy, reflecting the multifaceted nature of modern cyber threats.

If you’re looking to become a thought leader in this dynamic industry, a PhD in cybersecurity offers an unparalleled opportunity to deepen your expertise and broaden your horizons.

This guide is designed to give prospective cybersecurity PhD students a general overview of available cybersecurity PhD programs. It will also outline some of the factors to consider when trying to find the right PhD program fit, such as course requirements and tuition costs. 

Industry demand for PhDs in cybersecurity

Like other cutting edge technology fields, until recently, cybersecurity PhD programs were often training grounds for niche positions specialized research, often for government agencies (like the CIA, NSA, and FBI),  or closely adjacent research organizations or institutions. 

Today, however, as the cybersecurity field grows to become more pervasive and consumer-oriented, there are opportunities for cybersecurity PhDs to work at public-facing companies like startups and name-brand financial, software, infrastructure, and digital service firms.

One trend that is emerging in the cybersecurity field is that cybersecurity experts need to be well-versed in a variety of growing threats. If recent headlines about cybersecurity breaches are any indication, there are a number of new attack vectors and opportunities for cybercrime and related issues. Historically, committing cybercrime took resources and a level of sophistication that required specialized training or skill.

But now, because of the pervasiveness of the internet, committing cybercrime is becoming more commonplace. So training in a cybersecurity PhD program gives students an opportunity to become an expert in one part of a growing and multi-layered field.

In fact, this trend of needing well-trained, but adaptable cybersecurity professionals is reflected by the move by cybersecurity graduate schools to offer specialized master’s degrees and many companies and professional organizations offer certifications in cybersecurity that focus on particular issues related to cybersecurity technology, cybersecurity law , digital forensics , policy, or related topics.

That said, traditional research-oriented cybersecurity positions continue to be in demand in academia and elsewhere — a trend that will likely continue. 

One interesting facet of the cybersecurity field is trying to predict what future cybersecurity threats might look like and then develop tools and systems to protect against those threats.

As new technologies and services are developed and as more of the global population begins using internet services for everything from healthcare to banking — new ways of protecting those services will be required. Often, it’s up to academic researchers to think ahead and examine various threats and opportunities to insulate against those threats.

Another key trend coming out of academic circles is that cybersecurity students are becoming increasingly multidisciplinary.

As cybersecurity hacks impact more parts of people’s everyday lives, so too do the academic programs that are designed to prepare the next generation of cybersecurity professionals. This emerging trend creates an enormous amount of opportunity for students that have a variety of interests and who are looking to create a non-traditional career path.

The best cybersecurity PhD programs for 2024

Capella university, georgia institute of technology, northeastern university, marymount university, school of technology and innovation, nova southeastern university, college of computing & engineering, purdue university, stevens institute of technology, worcester polytechnic institute, university of illinois at urbana-champaign, mississippi state university, new york institute of technology.

These rankings were compiled from data accessed in November 2023 from Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

What is required to get a PhD in cybersecurity?

Good news first: Obtaining a PhD in a field related to cybersecurity will likely create tremendous employment opportunities and lead to interesting and dynamic career options.

Bad news: Getting a PhD requires a lot of investment of time and energy, and comes with a big opportunity cost (meaning you have to invest four to five years, or longer, or pursuing other opportunities to obtain a doctoral degree. 

Here’s a quick breakdown of what is required to get a PhD in cybersecurity. Of course, specific degree requirements will vary by program. One growing trend in the field is that students can now obtain degrees in a variety of formats, including traditional on-campus programs, online degree programs , and hybrid graduate degree programs that combine both on-campus learning with online learning. 

Related resources

  • Online PhD in cybersecurity – A guide to finding the right program
  • Cybersecurity degree programs
  • Podcast episodes and expert interviews

Preparing for a cybersecurity doctorate program

Cybersecurity is a relatively new formalized technology field, nonetheless, there are a number of ways that students or prospective PhD candidates can get involved or explore the field before and during a graduate school program. A few examples of ways to start networking and finding opportunities include: 

Join cybersecurity organizations with professional networks

Specialized professional organizations are a good place to find the latest in career advice and guidance. Often they publish newsletters or other kinds of information that provides insights into the emerging trends and issues facing cybersecurity professionals. A couple of examples include:

The Center for Internet Security  (CIS) is a non-profit dedicated to training cybersecurity professionals and fostering a sense of collaboration. The organization also publishes information and analysis of the latest cybersecurity threats and issues facing the professional community.

The SANS Institute runs a number of different kinds of courses for students (including certification programs) as well as ongoing professional cybersecurity education and training for people working in the field. The organization has several options including webinars, online training, and live in-person seminars. Additionally, SANS also publishes newsletters and maintains forums for cybersecurity professionals to interact and share information.

Leverage your social network

Places like LinkedIn and Twitter are a good place to start to find news and information about what is happening in the field, who the main leaders and influencers are, and what kinds of jobs and opportunities are available.

Starting a professional network early is also a great opportunity. Often professionals and members of the industry are willing to provide guidance and help to students that are genuinely interested in the field and looking for career opportunities. 

Cybersecurity competitions 

Cybersecurity competitions are a great way to get hands-on experience working on real cybersecurity problems and issues. As a PhD student or prospective student, cybersecurity competitions that are sponsored by industry groups are a great way to meet other cybersecurity professionals while getting working on projects that will help flesh out a resume or become talking points in later job interviews.

The US Cyber Challenge , for example, is a series of competitions and hackathon-style events hosted by the Department of Homeland Security Science and Technology Directorate and the Center for Internet Security with the goal of preparing the next generation of cybersecurity professionals.

Internships

Internships also continue to be a tried and true way to gain professional experience. Internships in technical fields like cybersecurity can also pay well. Like the industry itself, cybersecurity internships are available across a wide range of industries and can range from academic research-oriented to more corporate kinds of work. 

Things to consider when choosing a cybersecurity PhD program

There are a number of considerations to evaluate when considering any kind of graduate degree, but proper planning is essential in order to be able to obtain a doctoral degree. It’s also important to note that these are just guidelines and that each graduate program will have specific requirements, so be sure to double-check.

What you will need before applying to a cybersecurity PhD program:

  • All undergraduate and graduate transcripts
  • A statement of intent, which is like a cover letter outlining interest
  • Letters of reference
  • Application fee
  • Online application
  • A resume or CV outlining professional and academic accomplishments

What does a cybersecurity PhD program cost?

Obtaining a PhD is a massive investment, both in terms of time and money. Obviously, cybersecurity PhD students are weighing the cost of becoming an expert in the field with the payoff of having interesting and potentially lucrative career opportunities on the other side.

Degree requirements are usually satisfied in 60-75 hours, so the cost of a doctoral degree can be well into the six-figure range. Here’s a more specific breakdown:

Tuition rates

The Cybersecurity Guide research team looked at 26 programs that offer a cybersecurity-related PhD degree. Here’s a breakdown of tuition rates (all figures are based on out-of-state tuition).

$17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology.

$86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.

$197,820 is the most expensive cybersecurity PhD program and is available at Indiana University Bloomington.

The good news is that by the time students get to the PhD level there are a lot of funding options — including some graduate programs that are completely funded by the university or academic departments themselves. Check out the cybersecurity scholarship guide for more specifics .

Additionally, funding in the form of research grants and other kinds of scholarships are available for students interested in pursuing cybersecurity studies. 

One example is the CyberCorps: Scholarships for Service program. Administered by the National Science Foundation, PhD students studying cybersecurity are eligible for a $34,000 a year scholarship, along with a professional stipend of $6,000 to attend conferences in exchange for agreeing to work for a government agency in the cybersecurity space after the PhD program. 

Frequently asked questions about cybersecurity PhD programs

Most traditional and online cybersecurity graduate programs require a minimum number of credits that need to be completed in order to obtain a degree. On average, it takes 71 credits to graduate with a PhD in cybersecurity — far longer (almost double) than traditional master’s degree programs. In addition to coursework, most PhD students also have research and teaching responsibilities that can be simultaneously demanding and really great career preparation.

At the core of a cybersecurity doctoral program is In a data science doctoral program, you’ll be expected to learn many skills and also how to apply them across domains and disciplines. Core curriculums will vary from program to program, but almost all will have a core foundation of statistics.  

All PhD candidates will have to take a series of exams that act as checkpoints during the lengthy PhD process. The actual exam process and timing can vary depending on the university and the program, but the basic idea is that cybersecurity PhD candidates generally have to sit for a qualifying exam, which comes earlier in the program (usually the winter or spring of the second year of study), a preliminary exam, which a candidate takes to show they are ready to start the dissertation or research portion of the PhD program, and a final exam where PhD students present and defend their research and complete their degree requirements. 

A cybersecurity PhD dissertation the capstone of a doctoral program. The dissertation is the name of a formal paper that presents the findings of original research that the PhD candidate conducted during the program under the guidance of faculty advisors. Some example cybersecurity research topics that could potentially be turned into dissertation ideas include: * Policies and best practices around passwords * Ways to defend against the rise of bots * Policies around encryption and privacy * Corporate responsibility for employee security * Internet advertising targeting and privacy * The new frontier of social engineering attacks * Operation security (OpSec) strategy and policy * Network infrastructure and defense * Cybersecurity law and policy * The vulnerabilities of biometrics * The role of ethical hacking * Cybersecurity forensics and enforcement

A complete listing of cybersecurity PhD programs

The following is a list of cybersecurity PhD programs. The listing is intended to work as a high-level index that provides enough basic information to make quick side-by-side comparisons easy. 

You should find basic data about what each school requires (such as a GRE score or prior academic work) as well as the number of credits required, estimated costs, and a link to the program.

Arizona State University

  • Aim: Equip students with in-depth expertise in cybersecurity.
  • Study Modules: Delve into advanced computer science subjects and specific cybersecurity courses.
  • Research Component: Students undertake groundbreaking research in the cybersecurity domain.

Carnegie Mellon University

  • CNBC Collaboration: A joint effort between Carnegie Mellon and the University of Pittsburgh to train students in understanding the brain's role in cognition.
  • Training Program: Students take four main neuroscience courses and participate in seminars and ethics training.
  • Course Integration: Whether students have a B.S. or M.S. degree, they can combine the CNBC and ECE Ph.D. courses without extra workload.

Colorado School of Mines

  • Research Focus: Cybersecurity: Studying online security and privacy.
  • Cost and Financial Aid: Provides details on program costs and available financial support.
  • Current Mines Community: Offers specific information for those already affiliated with Mines.

Indiana University Bloomington

  • Focus Areas: Options include Animal Informatics, Bioinformatics, Computer Design, and more.
  • Information Sessions: The university holds events to guide potential students about admissions and study options.
  • Minor Requirement: All Ph.D. students must complete a minor, which can be from within the Luddy School of Informatics or from another approved school at IU Bloomington.

Iowa State University

  • Details: The program is open to both domestic and international students.
  • Time to Complete: Ph.D.: About 5.2 years
  • Goals: Students should gain deep knowledge, follow ethics, share their findings, and do advanced research if they're writing a thesis.
  • Learning Goals: Master core areas of Computer Science, achieve in-depth knowledge in a chosen subfield, obtain expertise to perform original research, and demonstrate the ability to communicate technical concepts and research results.
  • Duration: Median time to earn the doctorate is 5.8 years.
  • Application Information: The program is open to both domestic and international students.
  • Program's Aim: The Ph.D. program is tailored to produce scholars proficient in leading research initiatives, undertaking rigorous industrial research, or imparting high-level computer science education.
  • Entry Routes: The program welcomes both students holding a B.S. degree for direct admission and those with an M.S. degree.
  • Dissertation's Role: It stands as the pivotal component of the Ph.D. journey. Collaboration between the student, their dissertation director, and the guiding committee is essential.

Naval Postgraduate School

  • Program Essence: The Computer Science Ph.D. is a top-tier academic program in the U.S.
  • Admission Criteria: Open to military officers from the U.S. and abroad, U.S. governmental employees, and staff of foreign governments.
  • Curriculum: Designed to deepen knowledge in computing, with a focus on the needs of the U.S. Department of Defense.
  • Emphasis on Research: The college showcases its strength in research through sections dedicated to Research Areas, affiliated Institutes & Centers, ongoing Research Projects, and specialized Labs & Groups.
  • Holistic Student Growth: The college promotes a comprehensive student experience, spotlighting Clubs & Organizations, campus Facilities, and tech Systems.
  • Guidance for Future Students: Provides tailored insights for students considering joining at various academic levels, from Undergraduate to PhD.
  • Broad Learning: The program covers many areas, from software and policy to psychology and ethics, reflecting the wide scope of cybersecurity.
  • Course Design: Students learn foundational security topics first and then dive into specialized areas, like cyber forensics.
  • Successful Alumni: Past students now work in places like NASA, Amazon, and Google.
  • Feature: Students can apply to up to three different campuses and/or majors using a single application and fee payment.
  • Preparing for a Globalized World: Courses such as Global Supply Chain Management equip students for international careers.
  • Tech-Forward Curriculum: Purdue's commitment to advanced technology is evident.

Rochester Institute of Technology

  • Cyberinfrastructure Focus: The program dives deep into how hardware, data, and networks work together to create secure and efficient digital tools.
  • Broad Applications: The program uses computing to solve problems in fields like science, arts, and business.
  • Success Rate: All RIT graduates from this program have found relevant roles, especially in the Internet and Software sectors.

Sam Houston State University

  • Program's Objective: The course aims to nurture students to be technically adept and also to take on leadership roles in the digital and cyber forensic domain across various industries.
  • Assessments: Students undergo comprehensive tests to evaluate their understanding.
  • Research Paper (Dissertation): Once students reach the doctoral candidacy phase, they must produce and defend a significant research paper or dissertation.
  • Funding: All Ph.D. students get financial help, so they can start their research right away.
  • Teachers: The program has top experts, including those who've made big discoveries in computer science.
  • Research Areas: Students can study the latest topics like AI, computer vision, and online security.

The University of Tennessee

  • Study Areas: Options include Cybersecurity, Data Analytics, Computer Vision, and more.
  • Tests: You'll have to pass a few exams, including one when you start, one before your final project, and then present your final project.
  • Courses: Some specific courses are needed, and your main professor will help decide which ones.
  • Big Exam: Before moving forward, you'll take a detailed exam about your research topic.
  • Final Step: You'll present and defend your research project to experts.
  • Overview: This program is for those with a degree in Computer Science or similar fields. It has special focus areas like Cybersecurity and Machine Learning.

University of Arizona

  • Study Plan: Students start with learning research basics and then dive into modern tech topics.
  • Support for Students: All PhD students get funding that covers their studies, a stipend, and health insurance. Money for travel to conferences is also available.
  • After Graduation: Alumni work at top universities and big companies like Google and Microsoft.

University of California-Davis

  • About the Program: Students engage in deep research, ending with a dissertation.
  • Jobs After Graduation: Roles in companies or academic positions.
  • Vibrant Community: Beyond academics, students join a supportive community, enriching their Ph.D. experience.

University of Colorado - Colorado Springs

  • Recognition: UCCS is recognized by the National Security Agency (NSA) and the Department of Homeland Security for excellence in Information Assurance Education.
  • Course Approval: The NSA has approved UCCS's courses as meeting national security training standards.
  • Overview: This program focuses on vital areas like cyber security, physical security, and homeland security.

University of Idaho

  • Partnership with NSA and DHS: The university is part of a program to boost cyber defense education.
  • Recognition: The University of Idaho is among the institutions recognized as Centers of Academic Excellence in Cyber Defense.
  • Objective: To minimize vulnerabilities in the national information infrastructure.
  • Overview: This program is meticulously crafted to deliver premier legal education to its students.
  • Courses: Encompasses a balanced mix of traditional legal doctrines, theoretical viewpoints, and hands-on practical experiences.
  • Aim: The primary objective is to equip students with top-notch legal education.

University of Missouri-Columbia

  • Seminars: PhD students should attend 20 seminars. If they were previously Master's students, their past attendance counts.
  • Timeline Requirements: Comprehensive Exam must be completed within five years of starting the program.
  • Dissertation and Publication: At least one journal paper must be submitted, accepted, or published.

University of North Carolina at Charlotte

  • Faculty: The faculty members are renowned for their impactful research contributions on a global scale.
  • Curriculum: The curriculum is versatile, catering to individuals aiming for academia as well as those targeting roles in the corporate, commerce, or public sectors.
  • Program: A blend of theoretical and hands-on research is emphasized, offering a well-rounded educational experience.

Virginia Tech

  • Seminars and Ethics: Students attend special seminars and complete training on scholarly ethics and diversity.
  • Guidance: Each student gets a faculty advisor. A group of faculty members, called a committee, also guides them.
  • Major Exams: Students go through four main stages: a qualifying process, a preliminary proposal, a research presentation, and a final defense.
  • Strong Research: WPI's PhD program is recognized for its excellent research contributions.
  • Practical Focus: The program teaches students to tackle real tech challenges.
  • Modern Labs: Students use the latest labs like the Human-Robot Interaction Lab.

Dakota State University

  • Program Goal: Train students to handle and prevent cyber threats.
  • Awards: The university has received top cybersecurity awards.
  • What You'll Learn: Research skills, cyber defense techniques, and ethical decision-making.

New Jersey City University, College of Professional Studies

  • About: Focuses on best practices in areas like national security, cyber defense, and crisis communication.
  • Recognitions: The program has been honored by the National Security Agency since 2009 and was recognized for excellence in intelligence studies.
  • Jobs: Graduates are prepared for top roles in sectors like government and education.
  • Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas.
  • Location Benefits: The university is near many cybersecurity companies and government agencies, giving students unique opportunities.
  • For Working People: It's crafted for professionals, allowing them to experience various cybersecurity roles, from tech firms to government.
  • Completion Time: Students have up to ten years from starting to finish their dissertation.
  • Program: Trains students for roles in academia, government, and business.
  • Multidisciplinary Approach: The program combines both technical and managerial aspects of cybersecurity, offering a comprehensive understanding of the field.

The University of Rhode Island

  • Research Focus: The Ph.D. program is centered around a big research project in Computer Science.
  • Qualifying Exams: Students take exams on core topics, but some might get exemptions if they're already skilled in certain areas.
  • Equal Opportunity: The University of Rhode Island is committed to the principles of affirmative action and is an equal opportunity employer.

University of North Texas

  • Team Effort: The program is a collaboration between various UNT departments for a well-rounded view of cybersecurity.
  • Goals: The course aims to develop critical thinkers who are passionate about the role of information in our lives and can work across different fields.
  • Skills Gained: Students will learn about research, teaching methods, decision-making, leadership, and analyzing data.

New York University Tandon School of Engineering

  • Scholarships: Many students get scholarships that pay for tuition and give a monthly allowance.
  • Research Interest: Research areas include cybersecurity, computer games, web search, graphics, and more.
  • Experience: Students can also research in NYU's campuses in Shanghai or Abu Dhabi.
  • One Degree for All: Every student gets the same Ph.D., regardless of their specific area of study.
  • Research Focus: The program emphasizes deep research and prepares students for advanced roles.
  • Major Project: Students work on a big research project, adding new knowledge to the computing world.
  • Program: Prepares students for leadership roles in different sectors.
  • Opportunities: Qualified students might get opportunities as Research or Teaching Assistants.
  • Overview: Focuses on advanced research and modern technologies.

Augusta University

  • Goal: The program prepares students for research roles and to make new discoveries in tech.
  • Benefits: A Ph.D. opens up leadership opportunities in tech sectors.
  • Overview: It focuses on new discoveries in areas like security, artificial intelligence, and virtual reality.

University of Texas at San Antonio

  • Financial Support: Full-time students can get funding, which covers tuition and offers roles like teaching assistants.
  • Job Prospects: UTSA trains students for jobs that are in high demand, using data from official sources.
  • Overview: The program focuses on in-depth research and teaching.

University of Central Florida

  • Mix of Subjects: Students can take courses from different areas, giving them a broad view of security topics.
  • Many Job Options: Graduates can work in government, big companies, or teach in universities.
  • Hands-on Learning: The program offers research, study projects, and internships for real-world experience.

We use cookies to improve your experience on our site and to show you personalised advertising. To find out more, read our privacy policy and cookie policy

  • Study at UOW
  • Computer Science & Information Technology
  • Cyber Security

Gain sought after skills to thrive in one of the world's most in-demand industries.

Study Cyber Security

Cyber attacks are on the rise globally. Every sector faces the daily threat of cyber security incidents. When you work in cyber security, you embark on a journey of continuous learning to keep organisations safe from cyber threats. With UOW's postgraduate cyber security courses, you'll gain sought-after skills that will help you thrive in one of the world’s most in-demand job areas.

  • Book a phone consult
  • How to apply
  • Download a course brochure

Get up to 75% off your fees in 2024

In 2024, the Government will pay up to 75% of the course fees for eligible Domestic students studying the postgraduate courses at UOW. There’s never been a better time to get started on your next qualification.

cyber security phd programs australia

Graduate Certificate in Cyber Security

The Graduate Certificate in Cyber Security   can be studied over six months full-time. This course runs in short 10-week sessions, with two subjects offered each session. You can also choose to study one subject at a time which is considered part-time which will take one year. 

Master of Computer Science (Cyber Security)

The Master of Computer Science (Cyber Security) can be studied over 2 years full-time (four subjects per semester). You can also choose to study part-time and work at your own pace. Students who are working full-time often study part-time, choosing to complete one to two subjects per semester, taking four years to complete the full degree.

Credit for prior learning

  • Applicants with a Bachelor degree in Computer Science may apply for credit for 24 credit points (1 session).
  • Applicants who successfully complete the Graduate Certificate in Cyber Security will receive 24 credit points of specified credit into the Master of Computer Science (Cyber Security).

The Graduate Certificate in Cyber Security includes four core subjects:

  • Python Programming for Cyber Security
  • Databases and Security
  • Cyber Security Risk and Risk Management
  • Web Security

View the Course Handbook for the complete course structure and learning outcomes.

The Master of Computer Science (Cyber Security) requires the successful completion of 96 credit points, with the following subjects:

  • Programming and Data Structures
  • Data Management Systems
  • System Analysis and Project Management
  • Web Development
  • Strategic Network Design
  • Security, Ethics and Professionalism
  • Security Essentials
  • Artificial Intelligence for Cybersecurity
  • Emerging Topics in Cyber Security

Plus your choice of:

  • Professional Capstone Project
  • Research Project

If you have successfully completed the online Graduate Certificate of Cyber Security or a Bachelor of Computer Science prior to starting this course, you will be eligible for 24 credit points of specified credit (four subjects).

  • 2024 Session 1: 29 January - 7 April 2024
  • 2024 Session 2: 22 April - 28 June 2024
  • 2024 Session 3: 15 July - 20 September 2024
  • 2024 Session 4: 7 October - 13 December 2024
  • 2024 Autumn Session: 26 February – 21 June 2024
  • 2024 Spring Session: 22 July – 15 November 2024

The above tuition fees are the amount payable for a Commonwealth Supported place.

Commonwealth Supported Places (CSPs) are university places where, for eligible domestic students, tuition fees are made up of two parts:

  • an Australian Government contribution (for some courses, up to three-quarters of the tuition fee is funded by the Australian Government)
  • a student contribution (the above amount, which may be deferred and repaid later via a HECS-HELP loan)

To be eligible for this fee subsidy, you must meet the following criteria: Be a domestic student, i.e. an Australian or New Zealand citizen, a permanent resident of Australia or a permanent Australian Humanitarian visa holder.

  * Total indicative course tuition fees shown is for a Commonwealth Supported place. These fees are based on normal course length and progression and are subject to change from year to year. For up to date information on course structure and fees, refer to the UOW Course Handbook .

UOW integrates online learning into nearly all subjects. However, when your course is offered through UOW Online, 100% of your course will be delivered online, including all tutorials, class discussions and submission of assessments. This delivery mode allows you to study from anywhere in the world with an internet connection. 

Studying online still means you will be able to connect with our passionate lecturers and teachers and network with your classmates.

On-campus at Wollongong or Liverpool campuses

When you study ‘on campus’ you will attend classes on the Wollongong or Liverpool campus between Monday and Friday, and you can sometimes choose class times outside business hours to help you organise study around your other commitments. UOW integrates online learning into all of our subjects so the time spent on campus is spent strengthening your understanding and practicing your skills.

It’s an interesting and challenging course that allows you to broaden your understanding of cyber security. The teachers’ level of knowledge and experience allowed the course content to understood very easily. This qualification has already assisted me in my current role and it will open up new avenues for my career as I progress in the future. Mitchell Prior Graduate Certificate in Cyber Security

cyber security phd programs australia

Fill out your details and we will reach out to provide more information.

cyber security phd programs australia

Book a time to speak to a postgraduate specialist over the phone.

cyber security phd programs australia

Applying to study at UOW is quick, easy and secure.

The top 3 reasons to study Cyber Security at UOW

#1 real-world experience.

Lecturers in this course are from the Institute of Cybersecurity and Cryptology (iC2) , one of the top-ranking cyber security research centres in Australia. We also cooperate with worldwide industry partners in cyber security and cloud, such as Cisco, Google, AWS, Deloitte, and Hack the Box.

#2 A booming job market 

There were more than 134,000 cyber security workers in Australia in 2021, up from 109,000 in 2020 and 107,000 in 2019. This number is predicted to increase by more than 20% annually. Source:  Australian Computer Society

#3 Set yourself up for a cyber career

"Students get theoretical and practical knowledge about Web Security, Database Security, Risk Management, and Python Programming for Cybersecurity. Some IT experience together with the lessons from this course will help them to find a very good position in the Cybersecurity field." Dr Chau Nguyen, Lecturer in Cyber Security at UOW.

Learn from the best

  • Access to experts
  • World-class education
  • Engaged ICT community

Access to world-leading cyber security experts with the backing of UOW’s Institute of Cybersecurity and Cryptology (IC²).

Willy Susilo: Guardian of the e-world

For 30 years, Professor Willy Susilo has been at the forefront of cryptographic and cybersecurity breakthroughs, forging the path to Australian cybersecurity and teaching others to do the same.

cyber security phd programs australia

UOW Computer Science and Information Technology degrees rank among the best:

  • Five-star study area : The 2022 Good Universities Guide awarded UOW for Learner Engagement and Skills Development in the study area of Computer and Information Technology. 
  • Subject experts : UOW ranked among the top 200 universities in the world for Computer Science and Information Systems in the QS World University Rankings by Subject 2021.

Researcher Johan Barthelemy

Become part of UOW's active ICT community:

  • Engage with like-minded students: Join the Wollongong Information Technology Society (WITS) at UOW and become part of a vibrant and engaged community.
  • Hands-on learning : You'll have access and opportunity to attend industry workshops, and work on industry-sponsored projects.
  • Learn from the best :  Learn from world-renowned academics who are experts in their field, and engage with guest industry lecturers throughout your degree.
  • Strong support for women : The Women in STEM (Science, Technology, Engineering and Mathematics) Student Society actively supports females studying STEM at UOW.

Staff member showing a student how to use virtual reality.

Taught by cyber security experts

Our students learn how to solve real-life cyber security problems faced by organisations today. You’ll learn hands-on skills such as running an autopsy of a real cyber-attack, conducting experiments on different kinds of web attacks, as well as an introduction to programming, risk management, and database and web security. Joonsang Baek Associate Professor, School of Computing and Information Technology

Support for postgraduate students

cyber security phd programs australia

If you have questions before you apply, complete the enquiry form or book a consult with one of our postgraduate course specialists.

cyber security phd programs australia

In 2024, most of UOW's postgraduate coursework degrees will offer Commonwealth supported places (CSP) to eligible Domestic students, which means you could save up to 75% off your course fees.

cyber security phd programs australia

UOW Careers service can help you gain professional experience, provide advice on resumes and applying for roles, engage with new employers as well as find you a new role using your new qualification.

cyber security phd programs australia

UOW understands that postgrad students may need study support. UOW offers online study support via our Learning Co-op, Library, Academic language and learning, plus maths and stats help.

Imagine where cyber security can take you

The course can lead to specialist roles such as secure software developer, database administrator. secure web developer, security analyst, ethical hacker/penetration tester, digital forensics analyst, cryptographer, security consultant, security architect, information security manager, or chief information security officer.

Woman sits at computer

Make an enquiry

  • Graduate Diploma in Cyber Security

Become a leader in cyber security, equipped with new and exciting ways to meet the security challenges of the future.

This one-year postgraduate program aims to create specialists with a deep understanding of cyber security’s impact on every aspect of modern life, and to empower cyber security leaders for a resilient, more productive digital future.

You'll undertake advanced level courses covering a range of key topics and delve deep into major cyber security challenges facing the world. You'll be prepared with a range of responses, including technical, policy, organisational, governance and geopolitical.

You'll gain integrated learning experience and advance your professional network by working with a cohort with diverse backgrounds from technology, business, mathematics and humanities, unique to UQ. You'll be equipped to look at the field from a different angle, ask bigger questions, and find new and exciting ways to tackle real and emerging cyber security threats.

Tailor your study in:

  • Cryptography
  • Cyber Criminology
  • Cyber Defence

You'll learn:

  • Fundamentals of Cyber Security
  • Information Security Essentials
  • Cyber Security Governance, Policy, Ethics and Law
  • Cyber Criminology and Global Security

Visit Future Students

  • Bachelor of Computer Science (Cyber Security)
  • Graduate Certificate in Cyber Security
  • Master of Cyber Security
  • HDR Scholarships
  • Executive education

Cybersecurity student opportunities

In our cybersecurity team, you’ll help organisations identify what technology assets are important to them, protect those assets, and detect, respond to, and recover from cyber security incidents all while building your career..

  • Link copied

Join the conversation

What is cybersecurity.

We help organisations reduce the likelihood and/or impact of a cyber incident. Our work enables organisations to focus on the business activities by protecting them to keep the lights on, as cyber security practices protect the organisation from business disruption caused by a cyber-attack.

We enable organisations to do the work they are designed to do. Businesses, government agencies, and non-profits all require cyber security services to ensure that they are able to operate without cyber intrusion.

We are the largest cybersecurity organisation in Australia and work across all key market sectors including financial institutes, telecommunications, healthcare, mining and metals, consumer markets and more.

You could be working in one of the following teams:

  • Core Cybersecurity
  • Advanced Security Centre
  • AEET (Security Architecture, engineering and emerging tech)
  • EY Identity
  • SRCR (Security Strategy risk, compliance and resilience)

What could you be doing?

  • Interact with clients to understand their cybersecurity capabilities and provide advice for ways to uplift their capabilities
  • Help clients understand their cyber threats and risks, and provide advice for ways to minimise threats and risks
  • Assess an organisation’s cybersecurity maturity and provide advice for ways to increase maturity
  • Work with project teams to research and recommend best practice cybersecurity
  • Design and implement cyber security tools and practices to protect the client’s technology assets
  • Help transform the cyber landscape of organisations through designing and implementing new tools to enhance their protection and detection capabilities
  • You may have the opportunity to travel to client sites in other parts of the country

What will you bring to the team?

  • Good interpersonal skills
  • Strong english writing (business writing) skills
  • Eagerness to learn
  • Interest in cyber security and motivation to pursue certifications
  • Time Management skills and ability to meet deadlines

Qualifications

We are open to applicants from any and all degrees.

  • Cyber Security
  • Computer Science
  • Information Systems

This is a guide only and for more information, you are encouraged to speak to an EY representative at an upcoming event.

Where could you be working?

All locations.

Interview tips

We want you to be the best you can be in your interview with EY. Use our interview tips to put your best possible self forward and show us what makes you, you.

Frequently Asked Questions

Have you got questions about applying to and working at EY? You’re likely to find answers and more information here .

Your career journey in Cybersecurity

As a graduate , you’ll be part of our 12-month graduate development program that has been developed for graduates in all service lines, and is focused on connection, learning and celebration.

The program will provide you with the opportunity to network with your peers from other service lines and geographies. Running in parallel to your technical learning, you will develop leadership skills to become a successful graduate, and as you grow as a transformative leader.

As a  Cybersecurity graduate , you’ll participate in our technology framework to assist with your career progression.

As a vacationer , after our company induction, you’ll start developing an understanding of how our Cybersecurity teams work and will be ready to work alongside teams on real client projects. You’ll meet other new vacationers from your office.

Your buddy and your counsellor will help you learn your way around the organisation, set your goals and plan your development while you’re here. You'll be well looked after with ongoing learning throughout the Vacationer Program with sessions facilitated by our Learning and Development team, Campus Recruitment team and service line specific training. The Vacationer Program is a great way to gain valuable audit experience, skills and networks to start building your career.

The support, guidance, advice and tips you need to apply to one of our program. Use our quick links to find out more.

Popular quick links

Benefits   Events   Tips   FAQs   Degree finder   Application process   Adjustments

Connect with us on social

Connect with us

Our locations

Legal and privacy

EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.

EY | Assurance | Consulting | Strategy and Transactions | Tax

EY is a global leader in assurance, consulting, strategy and transactions, and tax services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities.

EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit ey.com.

© 2020 EYGM Limited. All Rights Reserved.

EYG/OC/FEA no.

This material has been prepared for general informational purposes only and is not intended to be relied upon as accounting, tax, or other professional advice. Please refer to your advisors for specific advice.

EY logo

Welcome to EY.com

In addition to cookies that are strictly necessary to operate this website, we use the following types of cookies to improve your experience and our services:  Functional cookies  to enhance your experience (e.g. remember settings),  Performance cookies  to measure the website's performance and improve your experience ,  Advertising/Targeting cookies , which are set by third parties with whom we execute advertising campaigns and allow us to provide you with advertisements relevant to you .

We have detected that you have enabled the Do Not Track setting in your browser; as a result, Advertising/Targeting cookies are automatically disabled.

You may withdraw your consent to cookies at any time once you have entered the website through a link in the privacy policy, which you can find at the bottom of each page on the website.

Review our  cookie policy  for more information.

Customize cookies

I decline optional cookies

You're viewing this site as a domestic an international student

You're a domestic student if you are:

  • a citizen of Australia or New Zealand,
  • an Australian permanent resident, or
  • a holder of an Australian permanent humanitarian visa.

You're an international student if you are:

  • intending to study on a student visa,
  • not a citizen of Australia or New Zealand,
  • not an Australian permanent resident, or
  • a temporary resident (visa status) of Australia.

We have the answers to your postgraduate questions.

07 3346 9872

+61 7 3346 9872

 Send an enquiry

Email us, and we’ll get back to you as soon as possible.

Enquire now

Find an agent

Find a UQ agent near you.

How to apply

It’s easy, but there are a few things to consider.

Learn how to apply

Ready to apply?

Start today. Save for later if you need to.

Start application

front cover of master your future guide

Graduate Certificate in Cyber Security

Become a leader in cyber security, equipped with new and exciting ways to meet the security challenges of the future.

This six month program aims to create specialists with a deep understanding of cyber security’s impact on every aspect of modern life, and to empower cyber security leaders for a resilient, more productive digital future.

You'll undertake four advanced level courses covering a range of key topics. You'll learn about the major cyber security challenges facing the world and a range of responses, including technical, policy, organisational, governance and geopolitical.

You'll gain integrated learning experience and advance your professional network by working with a cohort with diverse backgrounds from technology, business, mathematics and humanities, unique to UQ.

As a result, you'll be equipped to look at the field from a different angle, ask bigger questions, and find new and exciting ways to tackle real and emerging cyber security threats.

An inter-disciplinary approach

It’s estimated that Australia will need an additional 18,000 cyber security professionals by 2026, so in partnership with industry experts, UQ has developed the first program to genuinely address the interdisciplinary nature of this field, while meeting the need for deep technical specialisation in core areas.

Program highlights

  • Study specialised topics such as cryptography, cyber criminology, cyber defence and leadership.
  • Gain integrated learning experience and advance your professional network.
  • Undertake an industry or research-based project to improve your workforce readiness.
  • Acquire a global perspective on cyber security and information security fundamentals.

1 in Queensland for computer science and information systems

QS World University Rankings 2023

How you'll learn

Your learning experiences are designed to best suit the learning outcomes of the courses you choose.

  • Work placements
  • Laboratory work

What you'll study

At UQ, degrees are called 'programs' and subjects are called 'courses'. Here's a sample of the courses you could study in this program:

  • Fundamentals of Cyber Security
  • Information Security Essentials
  • Cyber Security Governance, Policy, Ethics and Law
  • Cyber Criminology and Global Security

See courses and program structure

Career possibilities

Postgraduate study can take you anywhere. Here are some of the careers you could be on your way to:

  • Cyber risk and governance consultant
  • Penetration tester
  • Cyber security analyst
  • IT security specialist
  • Cyber security designer
  • Risk and compliance analyst
  • Cloud infrastructure engineer
  • Incident response manager
  • Cyber security policy officer
  • Domain security architect

Graduate salary

Computing & information systems (postgraduate)

compared.edu.au

Next steps after graduation

  • The Australian Cyber Security Market is predicted to triple in size by 2026.
  • Cyber security specialist was the   #2 emerging job of 2020. (LinkedIn 2020 Emerging Jobs Report)

ryan-ko-master-cyber-security

Benefit from close industry ties and a breadth and depth of learning that no other cyber security university course in Australia offers. Students will spend a large portion of their studies on the job, embedded in industry and gaining experience in applying their new knowledge to tackle real and emerging cyber security threats.

mike-holm-master-cyber-security-2

There is a lack of professionals available that meet industry need for both depth and breadth of cyber security knowledge, problem solving and at least some DevOps skills. Experience and specific skills can be acquired on the job, however, job applicants with a solid knowledge of cyber security are naturally at an advantage.

corey-schou-master-of-cyber-security

Viewing cyber security in the interdisciplinary way UQ is will give it life – it’s relevant, it’s hitting areas of high demand and it helps to develop a worldwide community of highly trained and trusted professionals who can rapidly respond to new threats and problems.

Career pulse graphic illustration showing 3 students with binoculars.

UQ Career Pulse

DNA strand graphic.

Discover Postgraduate Bioinformatics

Smiling girl amongst collage of dog, violin and wind turbine

4 August - 18 August

UQ Open Day

UQ Master of Laws graduate Theresa Shaw stands smiling in a light-filled atrium

What’s it like to study a postgraduate law degree at UQ?

7-minute read

Annabelle Khoo Bachelor of Laws (Honours) student sitting in the library with a laptop smiling at the camera

4 reasons to study a law degree at UQ

Extracurricular activities for law students

Extracurricular activities and opportunities for law students

5-minute read

Entry requirements

To be eligible for entry, you'll need:

  • a bachelor's degree (or equivalent) in any discipline, or
  • a graduate certificate or graduate diploma or master's degree in any discipline, or
  • to have completed post-secondary studies and 3 years full-time equivalent relevant work experience (see below). Applications based on post-secondary study and/or work experience will be individually assessed.

Relevant work experience

Relevant work experience includes a minimum of three years' work in a professional, knowledge-based or information-oriented workplace. This may include work in administration, business, customer support, finance, government, human resources, law, marketing, operations/project management, strategy and sustainability. This will need to be supported with evidence. 

Evidence of relevant work experience should include a letter from your employer (and/or previous employers) clearly stating the following:

  • That you work (or worked) within the specified organisation
  • The nature of your work, detailing any relevant duties and responsibilities to the entry criteria above
  • The length of time you were in your role/s (i.e demonstrating minimum length for entry) and whether this was full-time, part-time, or casual
  • Any further bespoke conditions listed by the entry criteria

Letters will typically be expected to be presented on company letterhead and signed by a manager or HR representative. A CV or resume is not a sufficient document on its own, and must be accompanied by a supporting letter as described above.

All applications based on work experience are subject to an individual assessment.

Entry into a program through work experience does not necessarily provide a pathway into further study in a Masters.

GPA equivalent

Select where you studied and your qualification to see the GPA equivalent you need to be considered for this program.

Use the GPA equivalent as a guide. When you apply, we’ll calculate your GPA using the UQ grading scale. Any failing grades will be included. Entry requirements are subject to change.

Equivalent subjects

Related programs.

Depending on your previous qualifications and current goals, you might want to consider one of these related programs:

  • Master of Cyber Security
  • Graduate Diploma in Cyber Security

English language requirements

IELTS overall 6.5; reading 6; writing 6; speaking 6; listening 6. For other English Language Proficiency Tests and Scores approved for UQ

TOEFL iBT (including Paper Edition) - Overall 87, listening 19, reading 19, writing 21 and speaking 19.

PTE Academic - Overall Score of 64 and 60 in all sub bands.

BE - A minimum overall grade of 4 plus a minimum grade of C in all macro skills.

CES - Overall 176 and 169 in all sub bands.

OET is not accepted.

There are other ways to meet the English language requirements. For some programs, additional conditions apply.

Learn how to meet the English language requirements

Student visas

International students who are accepted into full-time study in the Graduate Certificate in Cyber Security are eligible to apply for an Australian student visa (subclass 500).

There are a number of requirements you must satisfy before a visa is granted, including the genuine temporary entrant (GTE) requirement.

Learn more about student visas

Fees and Scholarships

Indicative annual fee.

Approximate yearly cost of full-time tuition (8 units). Your fees will vary according to your selected courses and study load. Fees are reviewed each year and may increase.

Learn more about postgraduate fees

Approximate yearly cost of tuition (8 units). Your fees will vary according to your study load. Fees are reviewed each year and may increase.

AUD $25,600

Government assistance, financial aid.

As an international student, you might be eligible for financial aid – either from your home country, or from the Australian Government.

Learn more about financial aid

Domestic places in the Graduate Certificate in Cyber Security are Commonwealth Supported. This means the cost of your education is shared between you and the Australian Government.

Instead of tuition fees, Commonwealth Supported students pay what are called student contribution amounts.

HECS-HELP is an Australian Government loan scheme to assist eligible students with the cost of their student contribution amounts.

Learn more about HECS-HELP

Centrelink support

The Australian Government offers a number of income-support payments to eligible Australian university students.

Learn about Centrelink payments for students

Scholarships

You may be eligible for more than 100 scholarships, including:

Applying online

All international applications should be submitted to UQ. If you prefer, you can use an  approved UQ agent in your country .

The program code for the Graduate Certificate in Cyber Security is  5251 .

Find out more about applying for postgraduate coursework study

All domestic applications should be submitted to UQ.

The program code for the Graduate Certificate in Cyber Security is 5251 .

Important dates

The closing date for this program is:

  • To commence study in semester 2 - May 31 of the year of commencement.
  • To commence study in semester 1 - November 30 of the previous year.

To learn more about UQ dates, including semester start dates, view the Academic Calendar .

  • To commence study in Semester 1 - January 31 of the year of commencement.
  • To commence study in Semester 2 - June 30 of the year of commencement.

Aboriginal and Torres Strait Islander applicants

For support with applying – or if you have any questions about university life – get in touch with our Aboriginal and Torres Strait Islander Studies Unit.

Contact the ATSIS Unit

Explore other programs

Graduate certificate in computer science, express yourself. and your interest..

They say choosing a degree is hard, which is why we've made it easy. Register your interest and we'll send you everything you need to know about applying to UQ.

Sign up for updates

We will use your information to keep you informed about UQ programs, news, events and scholarships. By submitting this form, you consent to the terms of UQ's Marketing consent and privacy notice .

Are you satisfied with the job search?

Sign up or login to continue

  • Receive alerts for relevant job opportunities
  • Save opportunities and keep track of your applied jobs
  • Follow your favourite employers
  • Access free Careers Advice, resources and more!

Featured Cyber Security employers

ANZ

View jobs calendar

View our career advice

View our career advice

Follow us

Cyber Security Graduate Jobs and Graduate Programs

1 - 20 of 213 results.

Deloitte

2025 Technology Graduate Program - Cyber Security

Diversity & Inclusion

Sign up or login to apply

Graduate Jobs

Available locations

  • North Sydney

Deloitte embraces technology as a catalyst for innovation and offers many career opportunities in the technology sector. As a technology professional at Deloitte, you'll work with cutting-edge technologies and help clients harness the power of digital solutions to drive their business forward.

2025 Cyber Graduate Program - Cyber Security

Apply for the 2025 Cyber Graduate Program - Cyber Security position.

In an increasingly connected world, cybersecurity has become paramount. At Deloitte, we offer exciting opportunities in the cyber field, where you'll help clients protect their digital assets and navigate the complexities of cybersecurity threats.

EY

2025 EY Graduate IT Security Program

Cultural Diversity

Join us full-time as an IT security graduate and let's shape your bright future together. We're committed to nurturing your career with continuous support, learning opportunities, and dynamic experiences.

BDO

Cyber Graduate Program

Apply for the Cyber Graduate Program position.

Hires applicants with degrees in

  • Cyber Security
  • Information Technology

Our Cyber team work with clients to evaluate and monitor business strategy, supporting clients in responding to cyber risks and threats and strengthening their organisations approach to security.

Flinders Port Holdings

Cyber Security Graduate Program

Flinders Port Holdings

Apply for the Cyber Security Graduate Program position.

  • Computer Science
  • Information Systems

Ahoy superstars. We’re on the lookout for an awesome Cyber Security Graduate to come aboard and embark on a career defining adventure of a lifetime.

Woolworths Group

Technology Graduates

Woolworths Group

Apply for the Technology Graduates position.

  • Bella Vista (Norwest)

Applications are now open for our 2025 program! Kick-start your career at Australia's largest retailer. Our Graduate Program is Bella Vista based with flexible working arrangements.

Optus

2025 Optus Technology Graduate Program - Cybersecurity

Optus Disability Network

  • Engineering Software

At Optus, we're on a mission to be Australia’s most loved everyday brand, with lasting customer relationships. We don’t sit back and wait for the future to happen, we are out there crafting our own path through new technology, innovation & investment.

Ausgrid

2025 Graduate Program – Technology

Diversity and Inclusion

The Ausgrid Graduate Program commences in late January 2025 and paves the way for our Graduates to develop and thrive in their careers, with access to experienced leaders, mentors, accelerated development opportunities and networking.

2025 Business Advisory Graduate Program - Technology

Apply for the 2025 Business Advisory Graduate Program - Technology position.

At Deloitte, we believe in the power of strategic guidance to drive business success. In business advisory, you’ll be able to work with leading organisations across industries, helping them navigate complex challenges and achieve their strategic goals.

2025 - International Student Opportunities - Technology

Apply for the 2025 - International Student Opportunities - Technology position.

Deloitte Australia accepts program applications from students who do not yet hold Australian permanent residence to augment our talent pools. All Australian offices except Canberra, where Australian citizenship is required.

Australian Taxation Office

2025 ATO Graduate Program - Cyber Security

Australian Taxation Office

Disability Support

Keeping Australians safe from ever-evolving cyber security threats is critical. As an ATO Cyber Security graduate, you’ll be a part of a team that protects Australians by delivering a range of policies programs and processes. Your work will protect the confidentiality and integrity of data holdings

ACS Foundation

Trainee Cloud Infrastructure Engineer (Remote)

ACS Foundation

Apply for the Trainee Cloud Infrastructure Engineer (Remote) position.

An IT consulting firm is looking for a Trainee Cloud Infrastructure Engineer to join their team. This role is 98% remote and flexible. This role requires FULL Australian working rights.

Graduate Helpdesk Support

Apply for the Graduate Helpdesk Support position.

Synenchron is looking for a full-time Graduate Helpdesk Support to join their team in Melbourne, Victoria. This role requires FULL Australian working rights.

Viva Energy

2025 Graduate Program – Technology & Digital (Melbourne)

Viva Energy

Apply for the 2025 Graduate Program – Technology & Digital (Melbourne) position.

Join an amazing team committed to supporting our evolving energy needs and helping to build and secure a sustainable energy future for Australia. Set your career destination and we will help you get there.

Generalist Jobs

Generalist jobs accept a wide range of disciplines including Cyber Security

Teach For Australia

Associate - Leadership Development Program (Technology)

Teach For Australia

Apply for the Associate - Leadership Development Program (Technology) position.

  • Regional Northern Territory
  • Regional South Australia
  • Regional Tasmania
  • Regional Victoria
  • Regional Western Australia
  • Data Science and Analytics
  • Telecommunications

Lead and teach from day one through the Teach For Australia Leadership Development Program. Push yourself to break the cycle of educational inequity, all while earning your Masters.

Graduate Program 2025 - Information Technology

Reserve Bank of Australia

The 2025 Graduate Development Program Information Technology (IT) at the Reserve Bank of Australia (RBA) is designed to support the development of emerging professional talent.

Telstra

Telstra Graduate Program 2025 – Information & Cyber Security

Apply for the Telstra Graduate Program 2025 – Information & Cyber Security position.

  • Regional New South Wales
  • Regional Queensland

Accepts International

  • Engineering

We're on the lookout for the next generation of passionate and enthusiastic graduates who are willing to challenge their thinking, apply their skills, and develop their careers in a fast-paced technological environment.

CSIRO

Information Technology Graduate Program 2025

Apply for the Information Technology Graduate Program 2025 position.

Applications are now open for our Information Technology Graduate Program. As a graduate you could be involved in cyber security, business applications, web infrastructure, supercomputing, networks and more.

Macquarie Group

2025 Macquarie Graduate Program (Technology and Data)

Macquarie Group

First Nations

  • Design and User Experience

More is possible for your future with a career in Technology at Macquarie. We invite technology and data students to apply for our 2025 Graduate Program based in Sydney or Melbourne.

Stockland

Stockland Technology Graduate Program 2025 - Pre-Register

Apply for the Stockland Technology Graduate Program 2025 - Pre-Register position.

  • Business and Commerce

Stockland's technology team is looking for graduates with a range of technical backgrounds to join our business in February 2025. Pre-register your interest now!

There is no Jobs Guide for this search.

Career Advice Banner

Too many applications, too little time?

Simplify things with our handy template for tracking jobs

Jobs guide for graduates

Related Searches

  • Business and Commerce Graduate Jobs in Sydney  ( 162 )
  • Business and Commerce Graduate Jobs in Melbourne  ( 144 )
  • Engineering Graduate Jobs in Sydney  ( 113 )
  • Business and Commerce Graduate Jobs in Brisbane  ( 105 )
  • Accounting Graduate Jobs in Sydney  ( 102 )
  • Information Technology Graduate Jobs in Sydney  ( 99 )
  • Engineering Graduate Jobs in Melbourne  ( 96 )
  • Computer Science Graduate Jobs in Sydney  ( 94 )
  • Accounting Graduate Jobs in Melbourne  ( 93 )
  • Banking and Finance Graduate Jobs in Sydney  ( 92 )
  • Information Technology Graduate Jobs in Melbourne  ( 88 )
  • Engineering Graduate Jobs in Brisbane  ( 80 )
  • Banking and Finance Graduate Jobs in Melbourne  ( 80 )
  • Computer Science Graduate Jobs in Melbourne  ( 74 )
  • Business and Commerce Graduate Jobs in Perth  ( 74 )
  • Engineering - Software Graduate Jobs in Sydney  ( 72 )
  • Economics Graduate Jobs in Sydney  ( 70 )
  • Data Science and Analytics Graduate Jobs in Sydney  ( 70 )
  • Information Systems Graduate Jobs in Sydney  ( 70 )
  • Engineering Graduate Jobs in Perth  ( 70 )

Enter an employer or university you want to find in our search bar.

Please select a field which you have completed your bachelor.

1300 974 990

Enquire now

UNSW Online

As little as 16 months

January, March, May, July, Sept and October

100% Online

Completion time dependent on individual study path, RPL, leave and course availability. Please speak to a Student Advisor for more information.

What you will study

The Graduate Diploma in Cyber Security program comprises eight online courses, with the option of selecting from a Security Management and Leadership or Security Engineering specialisation.

The Graduate Diploma program consists of four foundation courses, three specialisation electives, and one elective of choice. 

To find out more about each course download the program guide

Career pathways 

Take advantage of the worldwide demand for cyber security professionals with the Graduate Diploma in Cyber Security. In this 100% online program, you will gain a deepened understanding of current and emerging trends in cyber security and the technical skills to secure networks.

Download your program guide to find out more about how the Graduate Diploma in Cyber Security can align with your career aspirations to prepare you for a successful and diverse career.

Download guide

A Graduate Diploma in Cyber Security from UNSW will expand your career opportunities on a global and domestic level. You may pursue roles such as:

  • Foundations of Cyber Security 
  • Data Security and Privacy 
  • Cyber Security Ethics 
  • Principles of Security Engineering 

The UNSW Online experience

We are here to support you, every step of the way, to graduate from one of the world’s leading universities. Our online learning environment has been designed to seamlessly fit into your already busy schedule and you’ll be able to access course resources on any device, at any time.

Our academics are some of the best in the world and, even though you’re studying online, you can expect your learning experience to be the same high standard as that of our on-campus students.

Throughout your study journey, you will be able to turn to your Student Success Advisor, who is committed to assisting you from enrolment through to graduation. They are on-hand for all non-academic queries by phone or email.

You will also have access to Career Success – a curated, self-paced module that provides a framework for thinking about, and taking action to implement, an effective career plan. Through Career Success, you will have access to tools like Career AI (powered by VMock) and CaseCoach, and guides on crafting the perfect LinkedIn profile, resume, and cover letter.

cyber security phd programs australia

Specialisation electives

Security Management and Leadership

  • Cyber Operations 
  • Cyber and the Law 
  • Cyber Management and Governance 
  • Cyber Threats and Crime 
  • Cyber Risk & Resilience

Security Engineering 

  • Cloud Security 
  • Penetration Testing 
  • Advanced Penetration Testing 
  • Reverse Engineering 
  • Digital Forensics 
  • Foundations of Cyber Security  is a prerequisite for Advanced Penetration Testing, Big Data Management, Cloud Security, Cyber Management and Governance, Cyber Operations, Cyber Risk and Resilience, Cyber Threats and Crime, Cyber and the Law, Data Security and Privacy, Digital Forensics, Security Management and Leadership Capstone Project, Operating System Fundamentals, Penetration Testing, Reverse Engineering and Security Engineering Capstone Project.
  • Penetrating Testing  is a prerequisite for Advanced Penetration Testing

Should you choose to pursue a Master of Cyber Security upon the successful completion of your Graduate Diploma, the following prerequisites must be considered:

  • Operating System Fundamentals for Security  is a prerequisite for Digital Forensics and Reverse Engineering.
  • Fundamentals of coding: C and Assembler  is a prerequisite for Operating System Fundamentals and Reverse Engineering.

There are two specialisations to choose from in this program - Security Management and Leadership or Security Engineering. Please refer to your chosen specialisation to find out more about the entry requirements.

Eligibility for admission does not guarantee offer of a place. Study plans and completion times might vary depending on elective choice, RPL, leave and subject availability. For more information, speak with a Student Advisor.

  • Have completed a Graduate Certificate in Cyber Security with a WAM of 65 or greater as determined by the UNSW Postgraduate Coursework Entry Score Calculator  or no fails. OR
  • Have completed a recognised bachelors degree (or equivalent higher level education) in a cognate discipline (e.g. Business, Science, Leadership, Policy) with a WAM of 65 or greater as determined by the  UNSW Postgraduate Coursework Entry Score Calculator . OR
  • Four years of relevant experience* with demonstrated skills and ability in leadership. *Relevant experience for the Security Management and Leadership specialisation includes, but is not limited to, the following roles: Business Strategy, HR Management, Change Management, Project Management, or Policy and Leadership.
  • Have completed a Graduate Certificate in Cyber Security with a WAM of 65 or greater as determined by the  UNSW Postgraduate Coursework Entry Score Calculator  or no fails. OR
  • Have completed a recognised bachelors degree (or equivalent higher level education) in a cognate discipline (e.g. Computer Science, Science or Engineering or a degree containing considerable mathematics and/or statistics courses) with a WAM of 65 or greater as determined by the  UNSW Postgraduate Coursework Entry Score Calculator . OR
  • Four years of relevant experience* with demonstrated skills and ability in leadership. *Relevant experience for the Security Engineering specialisation includes, but is not limited to, the following roles: Business Systems Analyst, Front End Developer, Application Coder, Game Designer, Cyber Security Analyst, Software Developer, Consultant in Risk or Business, Penetration Tester, Security Team Manager, Digital Forensics Specialist, Cyber Security Change and Awareness Manager, Cyber Security Outreach Trainer, Private Investigator, Specialist Police and Military roles, Financial Analyst, Forensic Accountant, Computer Systems or Information Auditor, Data Privacy and Electronics Technician.

Related program

Prefer to learn more about technological disruptions to finance? Perhaps a Graduate Diploma in Financial Technology  is for you.

Graduate Diploma in Financial Technology

cyber security phd programs australia

Investing in the right program for you is important to us and we’re here to help. Simply send us an email or schedule a call-back at a time that works for you. We will assist you with:

  • Eligibility and entry requirements
  • How to apply and enrol
  • Program duration and fees
  • Program structure and pathways
  • Determining which program is for you
  • Understanding how online study works

Request a call-back

For more detailed and up-to-date information about your degree, including:

  • Course descriptions
  • What to expect from the program
  • Information about the program academics

Download program guide

cyber security phd programs australia

Advice for women looking to start a career in Cyber Security

A career in cyber security can be thrilling and satisfying. But for women considering a career in cyber, there is still uncertainty about workforce diversity.  

cyber security phd programs australia

How to start a career in cyber security

If you have aspirations to become a cyber security professional, you’ll be glad to hear that there’s never been a better or more crucial time to take that first step.  

cyber security phd programs australia

Threats in cyber security: a small business guide

Australia recently witnessed large-scale data breaches that affected some of the country’s most prominent corporations. In due time, it became evident that no business was

cyber security phd programs australia

Top three cyber secure countries and how they prepare against cyber attacks

The digital revolution has presented us with many opportunities, personally and professionally. But the unassuming ease with which we now live online comes with its downsides.

cyber security phd programs australia

Privacy Policy | Copyright & Disclaimers | Accessibility

Authorised by the Deputy Vice-Chancellor (Academic), Division of External Relations, UNSW CRICOS Provider Code 00098G, ABN 57 195 873 179

people downloaded a program guide in the last 24 hours .

IMAGES

  1. Cyber Security Degree & Courses in Australia

    cyber security phd programs australia

  2. PhD scholarships on Cyber software Security the university of

    cyber security phd programs australia

  3. Cybersecurity Graduate Programs 2024+

    cyber security phd programs australia

  4. University of Adelaide Cyber security cooperative research center

    cyber security phd programs australia

  5. Cyber Security Cooperative Research Centre PhD Scholarship in Australia

    cyber security phd programs australia

  6. Top 8 Australian Cybersecurity Frameworks (Updated 2024)

    cyber security phd programs australia

VIDEO

  1. Learn about the Schools Cyber Security Challenges

  2. Crafting an Australian cyber security strategy

  3. What it’s like to be a Cyber Security Analyst in Australia?

  4. Demystifying the NIST Cybersecurity Framework: What's New in Version 2?

  5. Soon to be a PHD in Cybersecurity… Now What?

  6. Why study cybersecurity in Australia?

COMMENTS

  1. PhD in Cyber Security

    PhD in Cyber Security The Centre welcomes applications from prospective PhD students wishing to broaden their career opportunities and expand their research knowledge and skills in cybersecurity. To express your interest please email your resume and proposal , together with certified translated copies of your undergraduate transcripts and ...

  2. Fully Funded PhD Scholarships available now ...

    We have multiple, fully-funded PhD scholarship opportunities, at the Macquarie University Cyber Security Hub, for domestic (AU citizen and Permanent Resident) and international candidates interested in cybersecurity, data privacy and artificial intelligence. The potential research topics include: Real-time cyber threat prevention mechanisms, Personal information leakage in natural language ...

  3. Doctor of Philosophy (PhD)

    UNSW Canberra's cyber security graduate program prepares students for the highest level of professional practice, enabling them to contribute significantly to the multidisciplinary study of cyber security. ... Canberra ACT 2600 Australia Telephone: +61 2 5114 5000. UNSW CRICOS Provider Code: 00098G TEQSA Provider ID: PRV12055 ABN: 57 195 873 ...

  4. Cyber Security PhD Unit Set

    About this PhD Unit Set. ECU has Australia's largest cyber security research and education program. Cyber Security research at ECU is supported by the Security Research Institute (SRI). With a reputation as one of the leading digital security and forensic groups in world, the SRI offers a range of PhD opportunities in the areas of cyber ...

  5. Doctor of Philosophy (PhD)

    This program involves a minimum of three years full-time study. Students undertake supervised research leading to the production of the thesis. The length of a doctoral thesis normally should not exceed 100,000 words of text and should be submitted for examination within 4 years of full-time study. Some advanced coursework may also be prescribed.

  6. Cyber Security PhD Projects, Programmes & Scholarships in Australia

    PhD Scholarship in Quantum-Safe Security Measures for IoT-based Intelligent Transport Systems. UNSW Sydney School of Computer Science and Engineering (CSE) A PhD scholarship is available for applicants with outstanding research potential and an interest in quantum-safe security measures for IoT deployments. Read more. Supervisor: Dr A Shaghaghi.

  7. Cyber Security, Ph.D.

    Master of Cyber Security (Operations) (8629) Master of Cyber Security, Strategy and Diplomacy (8631) The standard required is an average of 75 or better in the candidate's qualifying program. In addition, a research proposal must be submitted as soon as feasible after completion of the qualifying program. Admission to the program will be ...

  8. UQ Cyber

    As part of the program, you can specialise in cyber security, data science, machine learning, programming languages or scientific computing. ... Delve deeper into cyber security expertise, complete a PhD in the field alongside some of Asia Pacific's brightest cyber security minds. ... 8 in Australia for computer science and information technology.

  9. Cyber Security Cooperative Research Centre (CSCRC) Graduate

    The Cyber Security CRC (CSCRC) aims to inspire the next generation of cyber security professionals through working with some of the best cyber security researchers in Australia, and engagement with the CSCRC Industry and Government participants.. The goals of the CSCRC is to be an independent and collaborative centre where industry, government and research partners work together to create new ...

  10. Academic Centre of Cyber Security Excellence (ACCSE)

    Our cyber security education is based on teaching broadly based fundamentals at the undergraduate level, followed by specialised programs at the Masters level. This has led to the commencement and support of a large cohort of PhD students who are currently undertaking research in a range of cyber security topics.

  11. PhD study

    The National Security College PhD program develops experts in security policy with strong research skills. As a PhD student you'll work with increased independence, under the direction of a supervisory panel of experts in the field. Your research will make an original and important contribution to human knowledge, research and development. Each PhD student is supervised by an academic with ...

  12. Cyber security

    Research degrees are research based master's or PhD programs that focus on a single area of expertise. They provide students the opportunity to carry out highly specialised research under expert supervision. ... and from early in my career I noticed a growing need for Cyber Security professionals in Australia. Every day we hear terms like ...

  13. Postgraduate Cyber Security

    5 Master of Cyber Security and Master of Cyber Security (Professional). The Graduate Certificate of Cyber Security is not accredited by the Australian Computer Society Source: + Deakin references data from a range of government, higher education and reputable media sources. For more information, visit our list of media references.

  14. List of Cybersecurity PhD Programs

    $17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology. $86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools. $197,820 is the most expensive cybersecurity PhD program and is available at Indiana University Bloomington.

  15. Information technology and cyber security

    Research degrees are research based master's or PhD programs that focus on a single area of expertise. They provide students the opportunity to carry out highly specialised research under expert supervision. ... How a Deakin internship led to a career in cyber security. Meet Max, a cyber security graduate at Deakin, and learn about the ...

  16. Cyber Security

    UOW's Graduate Certificate in Cyber Security, you'll gain sought-after skills that will help you thrive. Eligible students get up to 75% off their fees in 2023. ... There were more than 134,000 cyber security workers in Australia in 2021, up from 109,000 in 2020 and 107,000 in 2019. This number is predicted to increase by more than 20% annually.

  17. Graduate Diploma in Cyber Security

    Graduate Diploma in Cyber Security. Cyber Security. Become a leader in cyber security, equipped with new and exciting ways to meet the security challenges of the future. This one year postgraduate program aims to create specialists with a deep understanding of cyber security's impact on every aspect of modern life, and to empower cyber ...

  18. Graduate Diploma in Cyber Security

    Open new career possibilities in cyber security with the Graduate Diploma in Cyber Security at Victoria University. This course will prepare you to be an IT security professional with specialised expertise in cyber security. You will learn the essential areas of cyber security, from proactive cyber threat detection and risk management to cyber ...

  19. Graduate Diploma in Cyber Security

    Graduate Diploma in Cyber Security. Become a leader in cyber security, equipped with new and exciting ways to meet the security challenges of the future. This one-year postgraduate program aims to create specialists with a deep understanding of cyber security's impact on every aspect of modern life, and to empower cyber security leaders for a ...

  20. Cybersecurity student opportunities

    The program will provide you with the opportunity to network with your peers from other service lines and geographies. Running in parallel to your technical learning, you will develop leadership skills to become a successful graduate, and as you grow as a transformative leader. As a Cybersecurity graduate, you'll participate in our technology ...

  21. Graduate Certificate in Cyber Security

    Graduate Certificate in Cyber Security. Become a leader in cyber security, equipped with new and exciting ways to meet the security challenges of the future. This six month program aims to create specialists with a deep understanding of cyber security's impact on every aspect of modern life, and to empower cyber security leaders for a ...

  22. Cyber Security Graduate Jobs (176 open now!)

    REMOTE. Closing in 17 days. Graduate Jobs. Brisbane. Cyber Security. and 4 others. An IT consulting firm is looking for a Trainee Cloud Infrastructure Engineer to join their team based in Brisbane, QLD. This role is 98% remote and flexible. This role requires FULL Australian working rights.

  23. Graduate Diploma in Cyber Security (Online)

    Australia is facing a severe shortage of job-ready cyber security workers, requiring an estimated 16,600 additional cyber security workers for technical as well as non-technical positions by 2026¹. The Graduate Diploma is designed for those looking to build upon foundational knowledge and gain the cyber security skills needed to meet demand in ...

  24. Everything You Should Know About Earning A Master's In Cybersecurity

    You can tailor your graduate curriculum to fill marketwide skill gaps, such as cloud computing security, as reported in the 2023 ISC2 Cybersecurity Workforce Study. Opt for a master's program ...