Select Page

Cyber Forensics and Security (Online)

This micro-credential will cover cyber forensics and security so that individual and organisational resources can be protected from potential cyber attacks.
Book ConsultationApply Now

Cyber Forensics and Security (Online)

This micro-credential will cover cyber forensics and security so that individual and organisational resources can be protected from potential cyber attacks.
Book ConsultationApply Now

SCIENCE

Cyber Forensics and Security (Online)

Micro-credential

This 15-point micro-credential comprises 8 weekly modules and is designed for IT professionals and those with a degree in computer science or a related discipline, the skills developed in this micro-credential will be particularly useful for those wishing to have a career in cybersecurity.

Recommended Background

Students will be IT professionals (with an undergraduate degree or equivalent professional experience)

University Entrance (or equivalent required for admission)

Currently, micro-credentials are only available to NZ citizens and permanent residents

Duration

8 Weeks

Next Start Dates

14 April 2025 (Q2)

Enrolment closes one week before the course starts.

Apply early to secure your spot.

Domestic Fees*

$960 (estimate)

Disclaimer: *The programme fees are indicative and estimates only. Fees are set in advance of each calendar year and will be updated on this webpage. Fees are inclusive of 15% GST, but do not include the Student Services Fee, course books, travel and health insurance, or living costs. Fees will be confirmed upon completion of enrolment into courses.

Why is this micro-credential right for you?

 

The risk of cyber threats posed to systems essential to our everyday lives, and to our privacy, is growing for individuals and organisations. As a result, cybersecurity skills are in demand more than ever. This micro-credential will cover cyber forensics and security so that individual and organisational resources can be protected from potential cyber attacks. The micro-credential introduces software, system, network security and their digital forensics investigations. It covers a range of topics including cybersecurity strategies, GDPR, identity and access management technologies, communications security, a range of topics on cyber forensics including mobile and photograph forensics investigations. Those who take this micro-credential will develop expertise in understanding cyber attacks, analysing security risks and vulnerabilities, applying a cybersecurity strategy, enforcing security policies, and assembling, implementing, and applying security tools and technologies. Furthermore, it provides an opportunity to upskill and learn to gather digital evidence from electronic devices in a suitable way for presentation in a court of law. This cybersecurity job training is not to be missed.

Programme Structure

This micro-credential appeals to professionals wanting a more specific study in cybersecurity. The micro-credential will be of particular benefit to IT professionals within organisations wanting to up-skill. It will assist organisations, ensuring they have expertise within their own talent pool reducing the costs of implementing an effective cyber security stance. This could be the case also for organisations with limited/constrained budgets (e.g., city councils, police, government organisations, healthcare providers, DHBs, etc.) that can be a potential target of malicious cyber activities.

Learners will be assessed through a combination of activities that assesses all of the learning objectives from each of the modules within the course. These will largely be case studies, assignments, and a final online exam (approx. 1 hour).

 

Module Description
Introduction to Cyber Security Introduces Cyber Security as a matter of global interest. Builds on Information/Computer Security and Network Security, from the perspective that it is more than merely confidentiality, integrity, and availability. Introduces the concept of a data breach, as well as GDPR.
Software Security Malware aims at compromising confidentiality, integrity, or availability of the data, applications, or systems. Develops both static and dynamic analysis tools to test and inspect programs to mitigate application vulnerabilities.
Identity and Access Management Examines systems like Open ID and OAuth to allow users to manage their own identities and enables online businesses to attract more customers, as well as access delegation without sharing passwords.
Communications Security Develops the use of SSL as a tool for establishing a secure channel that offers confidentiality and integrity. SSL uses handshake and record protocols for key establishment and secure transmissions of messages, respectively. In addition, examines the use of CDN services for protection against DDoS.
Introduction to Digital Forensics Introduces the importance of Digital Forensics and the types of Digital Forensic evidence that can be recovered.
Digital Forensic investigations Develops an understanding of digital forensic science for online Investigations. Encompassing the recovery and investigation of material found in digital devices, often in relation to computer crimes.
Mobile Forensics Develops an understanding of mobile device forensics investigations, including App investigations, exploring the types of evidence available, methods of investigation, and how to identify, analyse and document evidence as part of the investigation.
Photograph Forensics Develops an understanding of Photograph forensics science, including identifying evidence, analyse, and document digital photographs for forensic investigation purposes.

Course Benefits

Learners will develop an understanding of basic cyber forensics principles, as well as identify threats to software, systems, and communication networks. You will be equipped to describe countermeasures for protecting software, systems, and communication networks, and the limitations of malware countermeasures. Learners will be able to identify and evaluate the most common vulnerabilities and attacks, and will analyse network security protocols and their real life applications including Aotearoa security breaches.

Upon completion of the course, you will be awarded with 15 credit points from the University of Auckland. You will be issued with a digital badge from the University of Auckland which you can share across your digital profiles like LinkedIn.

Programme Structure

This micro-credential appeals to professionals wanting a more specific study in cybersecurity. The micro-credential will be of particular benefit to IT professionals within organisations wanting to up-skill. It will assist organisations, ensuring they have expertise within their own talent pool reducing the costs of implementing an effective cyber security stance. This could be the case also for organisations with limited/constrained budgets (e.g., city councils, police, government organisations, healthcare providers, DHBs, etc.) that can be a potential target of malicious cyber activities.

Learners will be assessed through a combination of activities that assesses all of the learning objectives from each of the modules within the course. These will largely be case studies, assignments, and a final online exam (approx. 1 hour).

 

Introduction to Cyber Security

Introduces Cyber Security as a matter of global interest. Builds on Information/Computer Security and Network Security, from the perspective that it is more than merely confidentiality, integrity, and availability. Introduces the concept of a data breach, as well as GDPR.

Software Security

Malware aims at compromising confidentiality, integrity, or availability of the data, applications, or systems. Develops both static and dynamic analysis tools to test and inspect programs to mitigate application vulnerabilities.

Identity and Access Management

Examines systems like Open ID and OAuth to allow users to manage their own identities and enables online businesses to attract more customers, as well as access delegation without sharing passwords.

Communications Security

Develops the use of SSL as a tool for establishing a secure channel that offers confidentiality and integrity. SSL uses handshake and record protocols for key establishment and secure transmissions of messages, respectively. In addition, examines the use of CDN services for protection against DDoS.

Introduction to Digital Forensics

Introduces the importance of Digital Forensics and the types of Digital Forensic evidence that can be recovered.

Digital Forensic investigations

Develops an understanding of digital forensic science for online Investigations. Encompassing the recovery and investigation of material found in digital devices, often in relation to computer crimes.

Mobile Forensics

Develops an understanding of mobile device forensics investigations, including App investigations, exploring the types of evidence available, methods of investigation, and how to identify, analyse and document evidence as part of the investigation.

Photograph Forensics

Develops an understanding of Photograph forensics science, including identifying evidence, analyse, and document digital photographs for forensic investigation purposes.

Course Benefits

Learners will develop an understanding of basic cyber forensics principles, as well as identify threats to software, systems, and communication networks. You will be equipped to describe countermeasures for protecting software, systems, and communication networks, and the limitations of malware countermeasures. Learners will be able to identify and evaluate the most common vulnerabilities and attacks, and will analyse network security protocols and their real life applications including Aotearoa security breaches.

Upon completion of the course, you will be awarded with 15 credit points from the University of Auckland. You will be issued with a digital badge from the University of Auckland which you can share across your digital profiles like LinkedIn.

*Fees are inclusive of 15% GST, but do not include the Student Services Fee, course books, travel and health insurance, or living costs. Amounts shown are indicative only. In addition to the tuition fee, there is a Student Services Fee of $4.44 per point (online). Fees will be confirmed upon completion of enrolment into courses.

Frequently Asked Questions about this micro-credential

Application FAQs

What are the entry requirements?

This course is for IT professionals (with an undergraduate degree or equivalent professional experience). Please note that for admission you must meet the requirements to study at a New Zealand University (e.g. through University Entrance or an alternative entrance pathway).

Is this micro-credential open to non-resident students?

No. Currently our micro-credentials are only open to NZ citizens and permanent residents.

What are the exact dates for the next intake?

There are 4 intakes per year, with the next intake starting:

  • 18 September 2023

Enrolment closes one week before the course starts. Enrol early to secure your spot.

Is the course fee a once-off lump sum?

Yes, the course fee is a once-off sum of $961 for domestic students.

Can I pay for my micro-credential through StudyLink?

Unfortunately, Student Loan (through StudyLink) cannot be used to pay for a micro-credential.

 

Studying FAQs
Can I study the course in my own time?

You can study at a time that suits you (within the allocated course dates). Auckland Online courses have been designed to be flexible yet structured to help you gain the knowledge in the time you have.

How is the course structured?

The course will run over 8 weeks, and will comprise of weekly modules, essentially 1 module per week. Further details on the course structure can be found under the ‘Course Structure’ tab further up on this page.

Can I study the course whilst working full-time?

Yes, our courses are designed for working professionals and are structured to be flexible yet structured to help you gain the knowledge in the time you have.

Assessment FAQs
How will I be assessed?

Learners will be assessed through a combination of activities that assesses all of the learning objectives from each of the modules within the course. These will largely be case studies, assignments, and a final online test (approx. 2 hrs).

Benefits FAQs
Does the course enable me to take further study at the University?

All our micro-credentials are credit bearing, so that you can progress your studies further towards a degree qualification. Please note, credits will need to be relevant to the programme you wish to study and satisfy the programmes specific entry requirements.

How many course credits will I attain upon completion of the course?

Upon completion of the course, you will be awarded with 15 credit points from the University of Auckland.

Do I get a certificate at the end? Will it reflect ‘online micro-credential’?

Upon completion of the course, you will be issued with a digital badge from the University of Auckland which you can share across your digital profiles like LinkedIn.

What employers or professional associations have endorsed the value and industry relevance of the learning outcomes of this micro-credential?

IT Professionals New Zealand
Ports of Auckland
RedShield Security Ltd

Start Your University Application

Before we transfer you to the University of Auckland application portal to start your application, we would like to capture a few details.

These details enable us to provide you with ongoing information about this course, including exciting updates or any upcoming webinars. Our advisors may also contact you to see if you require any personalised advice to guide you through the application process.

* indicates a required field

Cloud Computing for Business Professionals

Leave unchecked if you're not sure
How to Get Employer Funding for 100% Online Postgraduate Programmes & Courses

How to Get Employer Funding for 100% Online Postgraduate Programmes & Courses

If you’re feeling stuck in your job or you’re simply looking for a new challenge, a career change can shake things up and find your passion. But before you make the leap, here are a few things you need to think about! We explore the reasons why employers should sponsor their employees’ postgraduate study and how employees can secure funding from their employers.

read more