Fully Funded PhD Scholarships available now!

We have multiple, fully-funded PhD scholarship opportunities, at the Macquarie University Cyber Security Hub, for domestic (AU citizen and Permanent Resident) and international candidates interested in cybersecurity, data privacy and artificial intelligence. The potential research topics include: Real-time cyber threat prevention mechanisms, Personal information leakage in natural language processing models, Classification of cyberthreats robust against obfuscation, Security, privacy and fairness in machine learning, and Secure and private multiparty data analysis. Backgrounds in Computer Science and related fields with relevant research experience.  Scholarship components: The scholarship consists of a Tuition Fee Offset and a Living Allowance Stipend. The value and tenure of the scholarship is a “MQRES” full-time stipend rate of $28,854 per annum (in 2022 tax exempt for up to 3 years - indexed annually).

For more info, please visit

Please DM or email ( [email protected] ) us for further information.

Contacts: Prof.  Dali Kaafar , Dr  Hassan Jameel Asghar , Dr  Muhammad Ikram

Search this site

Powered by Google

PhD candidates are drawn from our pool of Masters graduates and work closely with the School of Cybernetics to generate novel research in applied cybernetics.

Our PhD program is a bit different. We implement a cohort approach, with candidates appointed through a competitive process. Our PhD candidates must have completed the Master of Applied Cybernetics. The PhD program is 3 years in length.

We have welcomed two cohorts of PhD candidates since the program was launched in July 2020. Read more about the launch of the program here.

Those wanting to apply for the PhD program should first apply to be accepted into our Masters program.

Other education #

phd cyber security australia

Learning Experiences

Helping individuals and organisations to navigate major societal transformations as emerging technologies scale.

phd cyber security australia

Master Program

Creating a new generation of practitioners with the skills and knowledge to help ensure future systems are safe, sustainable and responsible.

You are on Aboriginal land.

The Australian National University acknowledges, celebrates and pays our respects to the Ngunnawal and Ngambri people of the Canberra region and to all First Nations Australians on whose traditional lands we meet and work, and whose cultures are among the oldest continuing cultures in human history.

ip target image

  • Skip to main content
  • Australasia
  • Computer Science and IT
  • Computer Science
  • UNSW Sydney - University of New South Wales

You've reached your limit of 10 Favourites

Doctor of Philosophy (PhD) - Cyber Security UNSW Sydney - University of New South Wales " class="blu_btn vst_lnk visit_up" id="visitWebLinkId" onclick="ga('send','event', 'Interaction', 'Webclick', 'UNSW Sydney - University of New South Wales>' ,1, {'nonInteraction': 1});cpeWebLinkClick(this,'290408','72233','9','101475','N','3','57672288','UNSW Sydney - University of New South Wales','E,E1','','1','58');gaInsightLog(this,'290408>','72233','Australia','101475','N','null','null');GAForCkieOnFormSubmit('Visit Website','Course Details');" target="_blank" rel="noopener" href="https://www.hotcoursesinternational.com/study/cpe-track.html?url=https%3A%2F%2Fwww.unsw.edu.au%2Fin%2Fstudy%3Futm_source%3DIDP%26utm_medium%3Dreferral%26utm_campaign%3DIDP">

Study options.

  • International

What will I learn?

The Doctor of Philosophy (PhD) degree is offered in all faculties of the University of New South Wales and encourages initiative and originality in research. Candidates should make a significant and original contribution to knowledge in their field.

This program involves a minimum of three years full-time study. Students undertake supervised research leading to the production of the thesis.

The length of a doctoral thesis normally should not exceed 100,000 words of text and should be submitted for examination within 4 years of full-time study.

Some advanced coursework may also be prescribed.

Which department am I in?

Full time (3 years).

Please check with institution

*Price shown is for indicative purposes, please check with institution

9 September 2024, 17 February 2025

Canberra Campus

Australian Defence Force Academy,

Northcott Drive,

Australian Capital Territory,

2600, CANBERRA, Australia

Entry requirements

For international students.

As a general guide, the UNSW entry requirements for the degree of Doctor of Philosophy are as follows:

A candidate for the degree shall have been awarded an appropriate degree of Bachelor with Honours from the University of New South Wales or a qualification considered equivalent from another university or tertiary institution at a level acceptable to the UNSW Canberra Higher Degree Committee.

In exceptional cases an applicant who submits evidence of such other academic and professional qualifications as may be approved by the Committee may be permitted to enrol for the degree.

English Language Requirements:

IELTS: 6.5 overall (min. 6.0 in each subtest); TOEFL IBT (Internet Based): 90 overall (min. 23 in writing, 22 in reading, listening and speaking); Pearson (PTE - Academic): 64 overall (min. 54 in each subtest); C1 Advanced Cambridge: 176 overall (min. 169 in each subtest); C2 Proficiency Cambridge: 180 overall (min. 180 in each subtest); UNSW Global University English Entry Course (UEEC): Successful completion with a minimum overall grade of C+ and a minimum grade of C in the writing component.

*There may be different IELTS requirements depending on your chosen course.

About UNSW Sydney - University of New South Wales 4 Reviews

UNSW Sydney - University of New South Wales

UNSW Sydney is a world-leading teaching and research powerhouse, ranked in the top 20 universities worldwide.

  • Equal 19th in QS World University Rankings 2024
  • #1 university in Australia for Employment Outcomes
  • #1 in Australia for International Research Network
  • Among top world universities for 42 subjects (QS 2023)

Close

Study with us

  • Undergraduate
  • Postgraduate
  • Scholarships

Bachelor of Computer Science (Cyber Security)

Shape the digital future by gaining the knowledge and practical skills to design, develop and analyse computer-based systems.

The pace of change in digital technologies is extraordinary. Artificial intelligence, unprecedented computer power, the Internet of Things, big data and automation will continue to transform the way we work and the jobs we do in the future.

The Bachelor of Computer Science is a 3-year program designed to provide a deeper understanding of all aspects of computer technology. As computers become increasingly interconnected and support more services than ever, system security becomes more challenging and more crucial.

As part of the program, you can specialise in cyber security, data science, machine learning, programming languages or scientific computing.

You'll graduate ready to launch into an exciting career with skills that are in high demand from some of the world’s biggest technology corporations.

You'll learn:

  • Software Engineering
  • Information Systems
  • Discrete Mathematics
  • Computer Systems

Visit Future Students

Master of Cyber Security

Graduate diploma in cyber security, graduate certificate in cyber security.

Become a leader in cyber security, equipped with new and exciting ways to meet the security challenges of the future.

To get ahead in cyber security you need more than just technical skills. Our cyber security program will develop your broader strategic cyber security insight while deepening specialist skills and experience, preparing you to lead at a technological, organisational or policy level.

The two-year program will give you a deep understanding of cyber security’s impact on every aspect of modern life, and to empower cyber security leaders for a resilient, more productive digital future.

Gain integrated learning experience and advance your professional network by working with a cohort from diverse backgrounds in technology, business, mathematics, social science and law. Plus you'll undertake an industry or research-based project to improve your workforce readiness.

Tailor your study:

  • Cryptography
  • Cyber Criminology
  • Cyber Defence
  • Fundamentals of Cyber Security
  • Information Security Essentials
  • Cyber Security Governance, Policy, Ethics and Law
  • Cyber Criminology and Global Security

This one-year postgraduate program aims to create specialists with a deep understanding of cyber security’s impact on every aspect of modern life, and to empower cyber security leaders for a resilient, more productive digital future.

You'll undertake advanced level courses covering a range of key topics and delve deep into major cyber security challenges facing the world. You'll be prepared with a range of responses, including technical, policy, organisational, governance and geopolitical.

You'll gain integrated learning experience and advance your professional network by working with a cohort with diverse backgrounds from technology, business, mathematics and humanities, unique to UQ. You'll be equipped to look at the field from a different angle, ask bigger questions, and find new and exciting ways to tackle real and emerging cyber security threats.

Tailor your study in:

This six-month program aims to create specialists with a deep understanding of cyber security’s impact on every aspect of modern life, and to empower cyber security leaders for a resilient, more productive digital future.

During your studies you'll undertake four advanced level courses covering a range of key topics that delve into the major cyber security challenges facing the world.

Delve deeper into cyber security expertise, complete a PhD in the field alongside some of Asia Pacific's brightest cyber security minds.

To apply for a Doctor of Philosophy, visit Future Students  and follow the steps.

Boeing Darren Edwards Memorial Scholarship Endowment

Calboonya legacy information technology & computer science scholarship, queensland firebirds and blackbook.ai computer scholarship, hub24 regional qld electrical engineering and computer science scholarship.

Suited to a current, undergraduate domestic student studying in the areas of computer science and IT, Engineering, Science and mathematics. This scholarship is focused on diversity and financial hardship.

Scholarship features:

 Valued up to $4,500

 Scholarship duration, 1 year

 Applications open 1 March, 2022 and close 27 March 2022

Suited to a future or current, undergraduate international or domestic student studying in the areas of computer science and IT. This scholarship is focused on financial hardship.

 Applications open 6 August, 2021 and close 27 March 2022

Suited to a future, undergraduate and domestic student studying in the areas of computer science and IT, and engineering. This scholarship is focused on academic excellence and diversity.

 Valued at $5,000

 Scholarship duration, up to 3 years

 Applications open 1 March 2022 and close 27 March 2022

Suited to a future or current, undergraduate international or domestic student studying in the areas of computer science and IT, and engineering. This scholarship is focused on financial hardship, rural or remote.

 Valued at $8,000

 Applications open 2 August, 2021 and close 27 March 2022

Join the new breed of cyber security professionals.

Study Cyber Security and go beyond traditional thinking. We bring together students from technology, business, mathematics, social science and law to offer an integrated learning experience, unique to UQ. Our aim is to create specialists with a deep understanding of cyber security’s impact on every aspect of modern life, and to empower cyber security leaders for a resilient, more productive digital future.

8 in Australia for computer science and information technology

QS World University Rankings 2021 

Download the UQ Cyber Security study guides

postgraduate brochure

No other institute in the Asia Pacific offers an interdisciplinary approach to cyber security education like UQ. Our programs will give you a leading edge and you'll be recognised as a leader in the field of cyber secruity. Professor Ryan Ko Director of Cyber Security

What's it really like to study computer science at UQ?

Hear from Associate Professor Gianluca Demartini and current student Zyreen as they anwser some of the most commonly asked questions about computer science at UQ.

Zyreen is studying a Bachelor of Computer Science (Cyber Security).

Study Computer Science

Advanced Cyber Security Engineering Research Centre

Cyber Security Programs and Courses

phd cyber security australia

T he University of Newcastle offers a range of courses that include study in the area of Cyber Security:

  • PhD in Cyber Security
  • Master of Cyber Security
  • Graduate Certificate in Cyber Security
  • Bachelor of Computer Science with a Cyber Security Major

Professor Vijay Varadharajan

Professor Vijay Varadharajan

The University of Newcastle acknowledges the traditional custodians of the lands within our footprint areas: Awabakal, Darkinjung, Biripai, Worimi, Wonnarua, and Eora Nations. We also pay respect to the wisdom of our Elders past and present.

Are you visiting our site from South Asia ? Head to our dedicated page with all the information you need to study at the University of Newcastle. Close

您是否在中国访问我们的网址? 前往 专属页面 ,查询你在纽卡斯尔大学学习所需的所有信息。 Close

University of Adelaide home page

University Scholarships

Cyber Security Cooperative Research Centre (CSCRC) Graduate Scholarships

The Cyber Security CRC (CSCRC) aims to inspire the next generation of cyber security professionals through working with some of the best cyber security researchers in Australia, and engagement with the CSCRC Industry and Government participants.

The goals of the CSCRC is to be an independent and collaborative centre where industry, government and research partners work together to create new products, services and systems that deliver a secure and resilient national cyber security capability, and enhance cyber expertise for the nation, making Australia a safer place to do business. CSCRC also aims to attract, inspire, mentor and develop the next generation of cyber security professionals by offering the best and brightest students scholarships through our participating universities.

The field of cyber security aims to secure the confidentiality, integrity and availability of data by preventing unauthorised access or disruption to systems. It is primarily a domain of computer science, but there are range of problems related to cyber security that are best solved by cross-disciplinary approaches to the subject. Graduates are welcome to apply for a PhD or Masters scholarship in cyber security based on one of the 9 available themes.  See full details here .

Eligibility :

Have completed a Bachelor of degree with a 1st class Honours, or a Masters degree that contains a significant (and relevant) research component with equivalent academic performance in Computer Science or similar.

Be assessed by the Adelaide Graduate Research School as meeting all conditions for admission to the Masters or Doctoral program. For more information about the entry requirements for Higher Degrees by Research at the University of Adelaide, please visit the Adelaide Graduate Research School’s website .

Generous scholarships are on offer $37,000 to $50,000 per annum.  Please see CSCRC Information sheet for full details.

Enquiries :

For confidential discussion regarding this position, please contact Professor Ali Babar, School of Computer Sciences on Telephone +61 8 8313 4478 or Email [email protected]

The potential applicants should discuss their qualifications and research interests with the University of Adelaide’s lead researcher in the CSCRC Professor Ali Babar.  For detailed feedback on your qualifications and Expression of Interest (EOI), you are encouraged to send the following documents:

  • Your CV (2 pages)
  • A research proposal closely aligned with one of the CSCRC Research Themes
  • Copies of your academic transcripts
  • A one-page statement outlining which CSCRC Scholarship Category (outlined above) you are seeking to apply for, and why you would be a suitable CSCRC Scholar  

Further information on the formal application process, entry requirements for Higher Degrees by Research and admission and scholarship deadlines, please visit the Adelaide Graduate Centre website .

Cybersecurity Cluster

Our research addresses security and privacy challenges posed by our increasingly "online lives", where unprecedented volumes of personal information is transferred over the Internet and stored in the cloud.

Our research

Cybersecurity is an ongoing arms race between attackers and security researchers. It is not only important to simply build algorithms, tools, and systems addressing various scenarios, but also to update and adapt to the ever-changing cyber threat landscape.

Our team has strong expertise in characterising and exposing cyber risks through empirical studies, developing AI and machine learning based security solutions, and developing secure systems.

Key projects

Accountability in web3.

Our expert: Associate Professor Vincent Gramoli

Web3 promises to revolutionize the economy by letting users provide services to others without the need for centralised institutions. Unforunately Web3 operates on blockchain systems that are insecure and whose participants are not held accountable for their actions.

Redbelly is a blockchain system that offers security and performance for UTXO and account models. Its security stems from its deterministic consensus protocol, called Democratic BFT (DBFT), that prevents forks and its formal verification with parameterized model. Its performance comes from its superblock optimization that combines proposed blocks instead of selecting only one and discarding the other, and its lightweight validation. On the Diablo benchmarking framework, Redbelly outperforms six mainstream blockchains.

This project's goal is to create an accountable version of the Web3 by adding accountability to the Redbelly Blockchain system that features a scalable variant of the Ethereum virtual machine. This project is partially funded by a grant from the Ethereum Foundation.

A security benchmark suite for blockchains

Our partner: Rachid Guerraoui (Swiss Federal Institute of Technology, Lausanne)

Diablo  is a benchmark to evaluate blockchain systems on the same ground. It was developed in a partnership between University of Sydney and the Swiss Federal Institute of Technology Lausanne (EPFL) to evaluate blockchain and distributed ledger technologies when running realistic applications. The name Diablo stems from DIstributed Analytical BLOckchain benchmark. We are currently extending Diablo to test the security vulnerabilities of blockchain systems by using fuzzing, injecting faults and implementing malicious behaviors (51% attacks, attack of the clones, balance attack, etc.)

We believe that the result will be insightful to improve existing blockchain technologies and protect their users.

Extracting context-free specifications from blackbox programs

Our experts: Dr Rahul Gopinath , Dr Sasha Rubin

Our partner:  Andreas Zeller (CISPA Helmholtz Center for Information Security and Privacy, Germany)

To fuzz a program effectively, we need the input specification. However, such specifications are rarely available, or are inaccurate or obsolete. While extracting the input specifications from the program source is possible, the task becomes difficult when access to source code is unavailable. This project aims to leverage the side-channel information often available from the input processor on rejected inputs to infer the input specification implemented by such programs.

Enhancing supply chain security

Our experts: Dr  Rahul Gopinath , Dr Xi Wu

Our partners: Behnaz Hassanshahi, Paddy Krishnan (Oracle, Australia)

Supply chains are one of the emerging vectors for software exploitation. The problem is that a modern software may have on average 500 external dependencies, and a vulnerability in any of these represents a potential threat for the security of the application. This project aims at enhancing the security of software systems by automatically recovering the SLSA specifications of a program, which can allow a developer to make intelligent assumptions about the program's susceptibility to external threats through its supply chain.

Detecting and preventing algorithmic complexity attacks

Our expert:  Dr  Rahul Gopinath

Our partner: Associate Professor Jens Dietrich (Victoria University of Wellington)

Modern software systems rely on complex algorithms for data processing and often contain worst-case behaviours that can be exploited by adversaries for denial of service and other attacks. This project investigates how to identify and eliminate such vulnerabilities from given programs.

Betrayed by apps: automated, scalable detection of mobile app malpractices

Our expert: Dr Suranga Seneviratne

Our partners: Professor Aruna Seneviratne (University of New South Wales), Professor Sanjay Chawla (Qatar Computing Research Institute)

PhD students: Bhanuka Malith De Silva, Dishanika Denipitiyage, Nishavi Ranaweera (UNSW), Akila Niroshan (UNSW)

This project aims to develop a novel framework to detect content and privacy malpractices perpetrated by thousands of mobile apps. It will use innovative models and algorithms to achieve unprecedented levels of automation and scalability, making it possible for the first time to identify compliance violations across the global app ecosystem. Outcomes will include a knowledge base of prevalent app malpractices, detection algorithms, and a software framework for scalable app analysis. New evidence and tools will benefit both Australian and global policymakers and regulators in combating malpractices, users in identifying safe mobile apps for themselves, and local and global app market stakeholders in being more diligent about compliance.

Finding haystacks within haystacks: an AI framework for automated, machine-to-machine sharing of benign cyber intelligence data

Our expert:  Dr  Suranga Seneviratne

Our partners: Dr Caren Han (University of Western Australia), Ben Doyle (Thales Australia)

PhD student: Fariza Rashid

Industry partner: Defence Innovation Network

Cyber threat intelligence has evolved significantly over the last few years, and many organisations have the practice of sharing intelligence with other peer organisations. Many commercial solutions support both human-in-the-loop and machine-to-machine threat intelligence sharing. Despite its importance in increasing operational efficiencies in cyber threat intelligence, benign intelligence sharing still needs to be explored. To this end, we are developing learning models and algorithms to extract information from security analyst reports and other online reports on benign events and automatically convert them to formats suitable for machine-to-machine intelligence sharing. We will also use explainable AI techniques to further optimise the threat analysis process. 

Handling extreme class imbalance and learning from rare events

Our expert: Dr Charika Weerasiriwardhane , Dr  Suranga Seneviratne

Large-scale class imbalance can adversely affect the performance of deep learning algorithms. To improve the model reliability, we need strong generalisations on minority classes. In this research, we investigate reweighting the model loss function based on the sample characteristics (i.e. label, hard negatives, easy positives) to minimise a margin-based generalisation bound. The novel re-weighting approach intends to be generic in nature so that it can be integrated with natural loss functions such as hinge loss. We also devise techniques to overcome the barriers associated with optimizing a reweighted loss function. To this end, tight relaxation of the problem is to be proposed and optimisation is to be conducted in stages. We target to test the proposed framework on binary classification scenario in cyber security related applications: i.e. spam filtering and multi class classification task with vision benchmark datasets. 

Certifiable security and privacy risk robustness for deep neural networks

Our expert:  Dr  Suranga Seneviratne

PhD Student: Naveen Karunanayake

With DNNs widely deployed in many mission-critical and personalised applications, it is critical to avoid misbehaviours and information leakages of these models. In an era where the global regulations on privacy laws are getting tightened for traditional data access and collection (such as GDPR – General Data Privacy Regulation and CCPA - California Consumer Protection Act), organisations, developers, regulators, and many other stakeholders have no formal understanding on what to expect when there are increased attacks on DNNbased systems or how to protect and regulate them. A seemingly innocuous DNN deployment could lead to leaking confidential details related to finances, health, and biometrics of millions of people who intentionally or unintentionally provided data to build the model. An undefended model deployed in the real-world can also make incorrect or harmful decisions when fed carefully crafted adversarial examples or out-of-distribution data. Models such as DNNs must provide the needed certificate of guarantee in order for users to have the confidence to trust AI tools and for regulators to better regulate them.

Efficient algorithmic primitives for private distributed statistical inference

Our expert: Dr Clément Canonne

Performing statistical analysis and machine learning tasks on vastly distributed data is now a routine and ubiquitous task; at the same time, the need to guarantee the privacy of this data, which very often includes sensitive information such as medical or personal data, has become increasingly important. This project aims to design and develop practical, simple, data-efficient, and versatile building blocks for key machine learning tasks on personal or sensitive data, providing sound and rigorous privacy guarantees. We focus on developing such building blocks for three privacy settings, corresponding to three different threat models: central and local differential privacy, and shuffle privacy. This project is supported by an unrestricted gift from Google.

Our researchers

  • Professor  Athman Bouguettaya
  • Professor  Albert Zomaya
  • Associate Professor Vincent Gramoli
  • Associate Professor Mahendra Piraveenan
  • Dr  Clément Canonne
  • Dr  Rahul Gopinath
  • Dr Suranga Seneviratne
  • Dr  Qiang Tang
  • Dr Kanchana Thilakarathna

Study cybersecurity

Our Master of Cybersecurity equips graduates with an expert-level understanding of leading attack and defence techniques, assessing the security of networked systems, and applying cybersecurity strategies at the organisational level.

Collaborate with us

Find a supervisor, vincent gramoli.

The Australian National University

National Security College

search scope

  • Short programs
  • News & events
  • Policy Engagement
  • Master of National Security Policy
  • Scholarships

ANU National Security College on Twitter

You are here

NSC biosecurity overlay image

Degree structure

Scholarships and fees, further information.

Program Coordinator

The National Security College PhD program develops experts in security policy with strong research skills.

As a PhD student you’ll work with increased independence, under the direction of a supervisory panel of experts in the field. Your research will make an original and important contribution to human knowledge, research and development. Each PhD student is supervised by an academic with relevant expertise.

Admission requirements

To gain admission to the NSC PhD program, applicants need to have at minimum an upper second class (H2A) honours degree (or its equivalent) in security studies, international relations, political science or another cognate discipline.

Please note that it is a Crawford School requirement that you have confirmation from two proposed supervisors, one from the National Security College and another from the National Security College or Crawford School, confirming that they will supervise you for the duration of your candidature.

A PhD degree normally requires the completion of a thesis (around 100,000 words) over a period of three to four years (full-time). The thesis must make an original and substantial contribution to the academic literature, and it must demonstrate the student’s capacity to situate their research in the discipline of security studies.

Application process

Candidates interested in undertaking PhD study at the NSC should:

Review the general information on applying to undertake PhD study at ANU .

Review the NSC website to check the research interests of academic staff

Send an Expression of Interest to the academic staff member who you have identified as a possible supervisor for your PhD project.

Information in your Expression of Interest should include:

  • A proposed thesis topic (be as specific as you can) of relevance to national security policy
  • A preliminary thesis proposal of no more than 8-10 pages (see below)
  • The name of a potential supervisor from among the NSC academic staff
  • A copy of your academic transcript(s)
  • A CV including evidence of any work experience
  • A sample of your academic writing (published or unpublished)
  • A statement on whether your ability to undertake PhD study is dependent on being awarded a scholarship
  • The timeframe you envisage for commencing and completing your PhD study at ANU

As part of your application, you are required to prepare a PhD research proposal. The proposal can be used in part to: - Assess the merits of your application (for general acceptance and scholarships where relevant), - The fit of your research topic to NSC, Crawford and the ANU. - Guide you in your studies. Don’t worry though - the proposal is non-binding and often students revise their proposal when they commence their studies. In preparing your proposal to undertake your PhD in the NSC at Crawford, please consider:

Title - A precise and informative description of the project.

Viability During COVID-19 - All applicants should include a section in their application detailing the viability of their project in the context of COVID restrictions. This section should either: (a) explain how the project is not dependent on travel and/or fieldwork and therefore feasible regardless of restrictions in these domains; or (b) provide a 12-month plan outlining how the project will proceed if the current restrictions on fieldwork and travel continue. - Applicants should discuss the viability of their research project under COVID restrictions with their proposed supervisors prior to submitting the application.

Introduction - Context to set the scene as to why the research matters to national security - State the overall aims of your research - A clearly focused statement of the overall purpose of the proposed research (ie, why is it important?)

Research questions &/or hypotheses - The questions that the proposed research will address and/or the hypotheses that will be tested. What cases and/or time periods and why these?

Review of relevant literature - What is the current state of play in your topic area? - What gaps are in this literature that you can address? - Define any key terms/concepts you are drawing on - You need to demonstrate that are aware of the wider literature published internationally on this and related topics and that your research can engage on-going debates. Therefore, you need to provide a preliminary review of the key research that has already been carried out in the field and identification of the gaps in the literature that the proposed research aims to fill.

Proposed methods - An explanation of what type of data will be required to answer the research questions, or test the hypotheses and how the data will be collected and analysed. - Do include some comment on the feasibility of the project. Consider noting if you have any relevant skills or networks to help access the data needed. If not (and it is ok if not!), how will you acquire these skills and access (for example, through undertaking the compulsory methods coursework etc)?

Contribution - What is the contribution you are trying to make with your research? This may be a contribution to the literature, methods and/or policy.

Timetable - An indication of how the research will be carried out over the duration of a full-time (3 years for PhD) or part-time (6 years for PhD) candidature. Note that we generally encourage PhD students to be full time.

Resources - An indication of the funding that will be required over the course of the candidature (eg, for fieldwork) as well any special materials or training that may be necessary for the successful completion of the project.

Institutional fit - A statement on why NSC is suitable for your project and an indication of potential supervisors/advisors.

Reference list - Include here a bibliography of any literature you have cited in the proposal. Proposals at Crawford can be between 5-10 pages and usually at least 7-8 pages in length. Please take the above structure as a suggestion only. Different proposals will address the above factors to different degrees but all will have to address all of them to some degree. We also understand that some projects may be best presented in a different structure. For this reason, we encourage applicants to develop their proposal in consultation with their prospective supervisors.

  • If it is established that an appropriate academic supervisor is available, lodge a formal application through ANU . You can apply on an admission-only basis or for admission and scholarship.

More information on applying to undertake PhD study in the ANU College of Asia & the Pacific is available on the Graduate research page of their website.

English language admission requirements for student’s policy

Unless an applicant:

  • is a citizen of Australia; or
  • a citizen of one of the countries listed in the English Language Admission Requirements for Students policy and whose studies were conducted entirely in English; or
  • successfully completed prior full-time study in the medium of English for a minimum of two (2) years in one of the countries listed in the relevant ANU policy, no more than two (2) years prior to the date of the application to ANU

Applicants for this PhD program will normally require either:

  • an IELTS overall band score 6.5 with a score of at least 6.0 in all components; or
  • a minimum TOEFL score of 570 and a Test of Written English (TWE) score of 4.5 (paper-based test); or 230 and an Essay Test score of 4.5 (computer-based test); or a score of 80, with a minimum of 20 in Reading and Writing and 18 in Speaking and Listening_ _(internet-based test).

English language tests must have been taken no more than two (2) years before the date of application.

After candidates have contacted NSC academics and have been approved to submit an online application, they should submit an application to the National Security College and not Crawford school of Public Policy.

TPR presentations are designed to provide the committee, PhD cohort and others with the important contours of the proposed research project. The presentation should be no longer than 45 minutes, and should cover (1) the motivating research question/puzzle, (2) a mastery of the relevant literature(s) to demonstrate the existence of the puzzle, (3) the theoretical contribution to resolve it and (4) how empirical evidence will be used to do so. The presentation may also, if relevant, want to (5) dwell on the potential policy implications of the research. While all the details of this may take longer than 45 minutes, candidates should select the most important parts to ensure that the presentation stays within that time and allows adequate time for committee and audience questions.

All applicants should include a section in their application detailing the viability of their project in the context of COVID restrictions. This section should either (a) explain how the project is not dependent on travel and/or fieldwork and therefore feasible regardless of restrictions in these domains; or (b) provide a 12-month plan outlining how the project will proceed if the current restrictions on fieldwork and travel continue. Applicants should discuss the viability of their research project under COVID restrictions with their proposed supervisors prior to submitting the application.

James Mortensen's picture

James Mortensen

Lecturer and HDR Program Coordinator

Contact details

Room: 2.156

Sue Thompson's picture

Sue Thompson

Associate Professor

phd cyber security australia

Apply to study at the NSC in 2023

phd cyber security australia

Postgraduate Studies Information Evening

James Mortensen, PhD candidate at the National Security College

Infinite hoops in life and quidditch – Q&A with ANU quidditch coach

Doctoral scholar probes Australia's Africa policy

Doctoral scholar probes Australia's Africa policy

National security college hdr travel grant.

The National Security College HDR Travel Grant provides additional research funding for new or existing domestic higher degree by research students from the College to undertake fieldwork or attend conferences.

Other scholarships

ANU offers a wide range of scholarships to students to assist with the cost of their studies.

Eligibility to apply for ANU scholarships varies depending on the specifics of the scholarship and can be categorised by the type of student you are.

Specific scholarship application process information is included in the relevant scholarship listing.

For further information

Australian Government logo

Updated:   4 June 2024 / Responsible Officer:   Head of College, National Security College / Page Contact:   Web administrator

  • Contact ANU
  • Freedom of Information

+61 2 6125 5111 The Australian National University, Canberra CRICOS Provider : 00120C ABN : 52 234 063 906

Group of Eight Member

39 Best universities for Cyber Security in Australia

Updated: February 29, 2024

  • Art & Design
  • Computer Science
  • Engineering
  • Environmental Science
  • Liberal Arts & Social Sciences
  • Mathematics

Below is a list of best universities in Australia ranked based on their research performance in Cyber Security. A graph of 2.3M citations received by 101K academic papers made by 39 universities in Australia was used to calculate publications' ratings, which then were adjusted for release dates and added to final scores.

We don't distinguish between undergraduate and graduate programs nor do we adjust for current majors offered. You can find information about granted degrees on a university page but always double-check with the university website.

1. University of Melbourne

For Cyber Security

University of Melbourne logo

2. University of New South Wales

University of New South Wales logo

3. University of Sydney

University of Sydney logo

4. Monash University

Monash University logo

5. Australian National University

Australian National University logo

6. University of Queensland

University of Queensland logo

7. Queensland University of Technology

Queensland University of Technology logo

8. University of Wollongong

University of Wollongong logo

9. University of Technology Sydney

University of Technology Sydney logo

10. Deakin University

Deakin University logo

11. Macquarie University

Macquarie University logo

12. University of Adelaide

University of Adelaide logo

13. RMIT University

RMIT University logo

14. University of Western Australia

University of Western Australia logo

15. Swinburne University of Technology

Swinburne University of Technology logo

16. University of South Australia

University of South Australia logo

17. Griffith University

Griffith University logo

18. Curtin University

Curtin University logo

19. La Trobe University

La Trobe University logo

20. University of Newcastle

University of Newcastle logo

21. University of Canberra

University of Canberra logo

22. Western Sydney University

Western Sydney University logo

23. University of Tasmania

University of Tasmania logo

24. Edith Cowan University

Edith Cowan University logo

25. Flinders University

Flinders University logo

26. James Cook University

James Cook University logo

27. Charles Sturt University

Charles Sturt University logo

28. Victoria University

Victoria University logo

29. University of Southern Queensland

University of Southern Queensland logo

30. Central Queensland University

Central Queensland University logo

31. Federation University Australia

Federation University Australia logo

32. Murdoch University

Murdoch University logo

33. University of New England, Australia

University of New England, Australia logo

34. Charles Darwin University

Charles Darwin University logo

35. Bond University

Bond University logo

36. University of the Sunshine Coast

University of the Sunshine Coast logo

37. Australian Catholic University

Australian Catholic University logo

38. Southern Cross University

Southern Cross University logo

39. University of Notre Dame Australia

University of Notre Dame Australia logo

The best cities to study Cyber Security in Australia based on the number of universities and their ranks are Melbourne , Sydney , Clayton , and Canberra .

Computer Science subfields in Australia

The University of Adelaide logo

Study at Adelaide

Defence cyber and space careers.

There’s no greater reassurance for our community than knowing we’re well prepared to prevent or avert threats to our security. As the no.1 STEM university in South Australia we offer a range of degree programs that will put you on the fast-track to launch a career in defence, cyber security or Australia’s thriving space sector.

Explore careers and courses

Pave your way into a career in the defence industry. Search for career options and the University of Adelaide degrees that will get you there.

The University of Adelaide’s world-class academics work in partnership with defence and industry to develop innovative technologies that help give our Australian Defence Force a real edge.

From deep learning autonomous systems and pattern recognition, to optimising and automating complex systems. To sensing, recognising and predicting patterns. There are many jobs and careers needed to support Australia’s defence industry.

I am starting my career in defence

  • Combat systems engineer   Design, build, integrate and maintain systems that control different kinds of equipment for the defence industry, including chemical, nuclear and biological equipment for combat environments. Undertake complex software modelling of sensors, command and control systems.
  • Data scientist (modelling and simulation)   Modelling, high fidelity computer simulation and analysis of complex dynamical systems across land, sea and air.
  • Electrical engineer   South Australia is home to many important defence investments and industries, including shipbuilding and the over-the-horizon radar project. Electrical engineers integrate systems including specification of interfaces between system components, create complex test scenarios of electrical and mechanical systems, and undertake analysis of statistical results.
  • Engineering designer   Design components of portions of systems and modify existing designs to develop or improve products and facilitate manufacturing operations.
  • Integrated logistic support engineer   Ensure a smooth and sustainable supply chain through management of product and resources. Analyse purchasing, warehousing, forecasting and customer relationships. Review design drawings and associated data to interpret and determine maintenance activity.
  • Integrated logistic support - technical   Technical expertise in the application of reliability, availability and maintainability (RAM) and failure modes effects and critical analysis (FMECA) relating to engineering projects.
  • Machine learning software engineer   Apply the latest developments in artificial intelligence and machine learning to problems in image processing and computer vision.
  • Mechanical engineer   Think of any machine and a mechanical engineer has most definitely worked on it. Using computer aided design programs, project manage the creation of a prototype, testing it and getting it into production.
  • Production engineer   Application of castings, machine processing, joining processes and tool design.
  • Radar specialist   Develop state of the art technology and field prototype systems to progress high frequency radars such as the Australian Defence Force’s Jindalee Over-the-horizon Radar Network (JORN).
  • Radio frequency engineer   Electromagnetic environmental effects research looking at the effects of radio frequency from both an environmental as well as tactical, situation.
  • Software engineer   Research, consult, analyse and evaluate computer programs and what they need to operate smoothly and efficiently. Identify technological limitations and problems in existing systems, processes, procedures or operating methods.
  • Subcontracts administrator   Manage subcontracts including negotiation and review of tenders, and preparation of tender comparisons for review.
  • Systems engineer   Develop, build and maintain complex systems, such as computer systems, that are used to provide solutions to technical problems. Maintain the security of systems ensuring there is backup and redundancy contingencies in place.
  • Test and activation engineer   Predict and analyse future production demand. Contribute to creating and implementing new strategic initiatives, including refining of products, services, processes and quality techniques through the production system.

I want to advance my career in defence

Postgraduate qualifications from SA’s #1 university

  • Master of Marine Engineering
  • Master of Engineering (Aerospace)
  • Master of Engineering -  Chemical ,  Civil & Structural ,  Civil & Environmental ,  Electrical ,  Electronic ,  Mechanical ,  Mechatronic ,  Mining
  • Master of Applied Project Management (Project Systems)
  • Master of Computer Science
  • Master of Data Science
  • Master of Cyber Security
  • Master of Computing and Innovation
  • Master of Psychology (Organisational and Human Factors)
  • PhD  in Computer Sciences, IT, Software Engineering, Telecommunications
  • PhD  in Mechanical and Mechatronic Engineering (including Robotics)

The Australian cyber security industry is rapidly growing. People with skills, knowledge and understanding of contemporary policing, intelligence, counter terrorism, programming and computer science are in high demand for cyber security jobs around the world.

You could develop strategies to secure health providers’ patient data. Or protect social media users’ personal details. Perhaps you’ll prevent cyber theft for global financial institutions. Or ensure undercover police officers’ identities aren’t compromised. Wherever your interests lie, your expertise will be in demand.

I am starting my career in cyber

  • Cryptanalyst   Develop algorithms, ciphers and security systems to encrypt sensitive information.
  • Cryptographer   Put into code ciphers, algorithms and security systems, and own responsibility for protecting those codes from cyber hackers.
  • Cyber security expert   Investigate, develop and deliver secure and robust systems and devices to protect information and privacy.
  • Electrical engineer - Cybersecurity   Cybersecurity is a high-growth industry. As more devices and systems are connecting to the Internet employers are increasingly seeking graduates who can develop secure and robust systems.
  • Security analyst   Detect and prevent cyber threats to an organisation. Looking for weaknesses in infrastructure and finding creative ways to protect your organisation.
  • Security engineer   A specialised engineering approach to cyber security, specifically in the design of security systems to counter potentially catastrophic issues.
  • Security software developer   Predict, prevent and protect cyber danger with security driven software.

I want to advance my career in cyber

Lead cutting-edge cyber security programs for governments, law enforcement agencies, large companies and non-government organisations with industry informed postgraduate study from SA’s #1 university:

  • Graduate Certificate in Cyber Security (Management)
  • Graduate Certificate in Cyber Security (Secure Software)
  • Graduate Diploma in Cyber Security

At master’s level you will gain:

  • a deep, interdisciplinary understanding of complex cyber security needs and considerations across multiple industries
  • highly advanced technical skills and the ability to apply them in real-world contexts
  • a sophisticated grasp of cyber security policy and governance considerations—social, legal and commercial
  • the ability to critically analyse and evaluate relevant data and technology
  • the refined interpersonal skills to effectively communicate issues and strategies to a range of stakeholders.

You’ll also take specialist courses in your chosen major—Cyber Security Management or Secure Software Development. And you’ll apply and expand your learning through a major research project, or industry-based practise.

Space science is the essential foundation that enables us to understand and operate technology in the unforgiving environment of space.

By virtue of Australia’s position on our planet, space technology plays a central role in affordable solutions to some of our pressing national challenges. It also presents Australia with unique opportunities to overcome the tyranny of distance presented by our sparsely populated continent.

The University of Adelaide offer the no. 1 degree in South Australia for astronomical and space sciences research. Our Bachelor of Science (Space Science and Astrophysics) has a strong emphasis on physics to unravel the mysteries of space and discover the fundamental processes that define our universe.

Start your career in space

  • Aeronautical researcher / physicist   Use sophisticated computer design techniques to create mathematical models of aircraft and “fly” them by computer simulation, allowing study of many different configurations before settling on a final design.
  • Aerospace engineer   Design, evaluate and test spacecraft, satellites, aircraft and missiles. Develop new technology and refine existing technology to make it safer or more efficient.
  • Astronaut   Astronauts usually have backgrounds in aerospace engineering, or electrical or mechanical engineering. Sometimes they start in maths or another engineering field. Keep in mind there is likely to be much more study and research to eventually become an astronaut, such as higher degrees like Masters and PhD.
  • Astrophysicist   Explore the universe’s most distant galaxies and apply the laws of physics and chemistry to explain the birth, life and death of stars, planets and galaxies.
  • Electrical engineer   Satellites and spacecraft systems rely heavily on electrical energy and systems, such as sensors, processors, radars, etc. The challenge of an electrical engineer for space is that, apart from a few manned missions, all electrical systems must operate for sustained periods of time without any maintenance in the hostile environment of space.
  • Information communications technology (ICT) leader   Give direction for ICT and business leaders on strategy, standards and opportunities for suitable technology solutions to maximise strategic benefits in the defence and aerospace markets.
  • Lawyer   Regulation and authorisation of Australia’s space activities and international arrangements affecting space regulation are important tasks of the Australian Space Agency.
  • Software engineer   The space industry needs software engineers for tool programming, control engineering and embedding controllers in aerospace vehicles that are networked through critical software design.
  • Space flight controller   Work at space agencies or space stations and use telemetry to monitor various technical aspects of space missions in real time.
  • Space scientist   Investigate the solar system and the practical use of space.
  • Spatial analyst   Join a team of data analysts who are changing the way the world uses spatial data.

I want to advance my career in space

Progress higher or change direction with a quality postgraduate qualification from SA’s #1 university:

  • Graduate Certificate in Computer Science
  • Graduate Diploma in Computer Science
  • Graduate Diploma in Engineering (Aerospace)
  • Graduate Diploma in Engineering (Chemical)
  • Graduate Diploma in Engineering (Electrical)
  • Graduate Diploma in Engineering (Electronic)
  • Graduate Diploma in Engineering (Mechanical)
  • Graduate Diploma in Engineering (Mechatronic)
  • Master of Engineering (Chemical)
  • Master of Engineering (Electrical)
  • Master of Engineering (Electronic)
  • Master of Engineering (Mechanical)
  • Master of Engineering (Mechatronic)
  • Master of Mathematical Sciences
  • Master of Software Engineering
  • Master of Philosophy
  • Doctor of Philosophy

Further enquiries

Call us:  +61 8 8313 7335

Toll free:  1800 407 527

Study with us

Undergraduate Postgraduate International students Adult entry / non-school leaver

More information

Answers to your questions Study overseas Student finance Admissions information

Study In Australia: The Ultimate International Student Guide

Search this blog, types of popular scholarships in australia for international students: complete list(undergraduate/masters/phd/short courses), 12 phd scholarship positions in cybersecurity and cryptology university of wollongong, australia.

fully funded PhD scholarships

About the PhD scholarship positions in Cybersecurity and Cryptology at University of Wollongong, Australia

An exciting multiple PhD scholarship positions currently open  for interested students with strong and outstanding research potentials to undertake research in Cybersecurity and Cryptology at University of Wollongong, Australia

The scholarship is available for outstanding applicants who are interested to conduct research in digital finance, blockchain, and cryptocurrencies. The scholarship offer will include living  stipend supports and tuition waiver.

The University of Wollongong Institute of Cybersecurity and Cryptology (iC2) is known world-wide for its capacity to train individuals in computer and information security. The aim of this institution is to conduct research, develop and put forward innovations in cybersecurity, Information security and computer security.

Also apply for this Fully Funded PhD scholarship positions at Australia National University-2022. The scholarship is open individuals with interest in Environment and society.  its a university sponsored scholarship program. Open all year round and fully funded

Scholarship overview and benefits

  • Scholarship Cover:  Full tuition fee
  • Research scholarship stipend value:  up to $50,000/annum AUD (tax free)
  • Degree Program:  PhD by research
  • Field of study:   Computer Science
  • Number of awards: 12
  • Application opens:  Currently open

 To apply:

Who to contact

Pro-tips for research scholarship applications

  • A guide on  General Masters/PhD scholarship requirements  to study in Australia, 
  • a guide on  How to apply for research Masters/PhD scholarships and admissions ,  
  • a guide on  How to apply successfully to scholarships abroad . 
  • Another essential guide that you must look at is   How to contact potential supervisors  when asking for a Masters or PhD Studentship position. 
  • A guide on  how to write a captivating research proposal for scholarship  applications, 
  • and finally  Research Proposal Guide for Successful Admission/Scholarship applications

Looking for more scholarships opportunities?

Check  related scholarship links below :  , full funded undergraduate scholarships full funded masters scholarships full funded ph.d. scholarships top scholarships infos and guides   list of australian universities with no application fee standard undergraduate scholarship requirements to study abroad(australia) standard postgraduate coursework degree program scholarship requirements a list of full funded government and institution sponsored scholarships   don't hesitate to leave a comment below, tell us about your experience in applying for scholarship abroad, your difficulties and how we can assist you if you need any help.  please  subscribe  here for all future updates and opportunities. kindly follow us on  facebook ,  instagram ,  twitter ,  linkedin  for more contents and updates. if you have questions that need wide response, feel free to joint our  facebook group community  of 50k+ active members to interact.  thanks, post a comment, scholarship types.

  • scholarships
  • PhD scholarships
  • Masters Scholarships
  • Undergraduate Scholarships
  • Free Online Courses
  • Fellowships

Student Visa Guidelines

  • Student Visa Infos

Jobs and Opportunities

  • Study and Work

Admissions and Scholarships Guidelines

  • Study in Australia Guide
  • Twitter (X)

Cyber Security CRC Scholarship Opportunities

UNSW Canberra is looking for talented researchers to join our team in solving challenging problems in Machine Learning, Natural Language Processing, Deep Learning and Network Dynamics for Cyber Deception working with the Cyber Security CRC €“ see https://www.cybersecuritycrc.org.au.

UNSW Canberra is looking for talented researchers to join our team in solving challenging problems in Machine Learning, Natural Language Processing, Deep Learning and Network Dynamics for Cyber Deception working with the Cyber Security CRC €“ see https://www.cybersecuritycrc.org.au .

Successful candidates would be awarded a Cyber Security CRC research scholarships or post doctoral fellowships. For further details see: 

Cyber Cooperative Research Centre Graduate Scholarship.pdf

Cyber Cooperative Research Centre Postdoc Fellowship.pdf

UNSW Canberra has a long standing relationship with Penten €“ a Cyber Security CRC Industry Participant, and we are looking for motivated individuals to work alongside our industry partners and academics in the exciting field of Machine Learning and Cyber Deception

Deception is an increasingly important tool in modern cyber security. A comprehensive cyber deception strategy, populated with realistic content and behaviours, can attract and expose attackers. Deceptive traps can be placed amongst real assets to entice  intruders or malicious insiders, who reveal their presence and intentions by interaction with the traps.

The success of such traps, however, depends on the extent to which they realistically mimic the attributes of actual components, devices and data. Their content, behaviour, metadata and interactions must all be similar enough to their real counterparts, without exposing protected or sensitive attributes, to be able to trap the adversary.

Historically, successful deceptions have been hand-crafted by domain specialists, at considerable costs in time and effort. Our project addresses the cost impediment to large scale deception adoption by developing technology to automate the generation of fake attributes and data. We harness Machine Learning to create realistic traps by learning from data on the protected assets. The traps include documents, databases, devices populated with user profiles and associated file systems, network traffic and other assets and processes.

The challenges of automation from real data, while managing the exposure of protected information, raises research questions in a number of areas in Machine Learning, Natural Language Processing, Deep Learning and Network Dynamics. Quantifying the characteristics of traps and empirical evaluation of trap efficacy and their impact on legitimate users are also components of the ongoing research activity.

Applicants must be Australian Residents.

Supervisor(s)

Nigel Phair, Director, UNSW Canberra Cyber [email protected]

School of Engineering & IT

Systems Engineering

9 cyber-security scholarships in Australia

Filtered by.

  • Scholarship
  • cyber-security

Refine Your Search

  • Undergraduate 3
  • Postgraduate 1
  • Curtin University 3
  • Edith Cowan University 3
  • CSIRO Postgraduate Scholarships 1
  • RMIT University 1
  • University of Adelaide 1
  • Computer Science 5
  • Arts and Literature 1

2023 HDR Scholarship - Curtin High-Performance Intelligent Systems (HPIS) PhD Scholarship

Intelligent Systems (HPIS) research group is looking for highly self-motivated PhD applicants who are interested in conducting research in the areas of Cloud/Edge Computing, Distributed Systems, Cyber Security

2024 - Mark Oliver Scholarship in Information Technology and Computer Science

Computing Honours Major Computing Major Cyber Security Major Software Development Major Software Engineering Major Bachelor of Engineering (Honours) Electrical and Electronic Engineering Honours and Computer

2024 RTP round - Exploring the determinants of end-user security behaviour

online / from home has further increased the potential range of targets for malicious actors and the security industry has not kept pace. The Australian government’s ambitious goal of being the most cyber

STEM Women in Computing Technologies Scholarship

) Bachelor of Computer Science (Professional) (BP347) Bachelor of Cyber Security (BP355) Bachelor of Cyber Security (Professional) (BP356) Bachelor of Data Science (BP340) Bachelor of Data Science

Western Power Aboriginal and Torres Strait Islander Scholarship

Security & Intelligence Bachelor of Information Technology Bachelor of Information Technology Honours Bachelor of Science Bachelor of Science ( Cyber Security ) Bachelor of Sustainability Bachelor of Science

Insight Via Artificial Intelligence (IVAI) PhD internship scholarship

, and deployment of artificial intelligence, machine learning, virtual/augmented reality, and data analytics technologies. IVAI is currently working on research projects related to applications in Cyber

2023 and 2024 International Australian Alumni Scholarship

Engineering (I59); Master of Engineering Science (J63). Science Master of Bioinformatics (I77); Master of Computer Science (I45); Master of Cyber Security (L33); Master of Data Science (I97); Master of

2023 and 2024 International Masters Scholarship

Computer Science (I45); Master of Cyber Security (L33); Master of Data Science (I97); Master of Environmental  Management (L86); Master of Environmental Science (J48); Master of Horticultural Science (T66

CSIRO Postgraduate Scholarships

me to build my career in this cyber - security world and in this Australian context, I think, CSIRO is the bestest spot to work with. [Image changes back to show Justin Delaney, seated and talking

Searches related to cyber security

  • computer science
  • postdoctoral
  • cybersecurity
  • phd information security
  • lecture cyber security
  • phd data analytics

COMMENTS

  1. PhD in Cyber Security

    PhD in Cyber Security The Centre welcomes applications from prospective PhD students wishing to broaden their career opportunities and expand their research knowledge and skills in cybersecurity. To express your interest please email your resume and proposal , together with certified translated copies of your undergraduate transcripts and ...

  2. Fully Funded PhD Scholarships available now ...

    We have multiple, fully-funded PhD scholarship opportunities, at the Macquarie University Cyber Security Hub, for domestic (AU citizen and Permanent Resident) and international candidates interested in cybersecurity, data privacy and artificial intelligence. The potential research topics include: Real-time cyber threat prevention mechanisms, Personal information leakage in natural language ...

  3. PhD

    PhD. PhD candidates are drawn from our pool of Masters graduates and work closely with the School of Cybernetics to generate novel research in applied cybernetics. Our PhD program is a bit different. We implement a cohort approach, with candidates appointed through a competitive process. Our PhD candidates must have completed the Master of ...

  4. Cyber Security PhD Unit Set

    About this PhD Unit Set. ECU has Australia's largest cyber security research and education program. Cyber Security research at ECU is supported by the Security Research Institute (SRI). With a reputation as one of the leading digital security and forensic groups in world, the SRI offers a range of PhD opportunities in the areas of cyber ...

  5. Professional doctorate

    Dr Timothy Trudgian. E: [email protected]. T: (02) 5114 5026. The Professional Doctorate program at UNSW Canberra combines doctoral research with professional practice to meet the needs of industry and professional groups in addressing real-world problems and improving lives in local and global communities.

  6. UQ Cyber

    Our impact. Multiple grants, external fundings since the establishment of UQ Cyber. The First interdisciplinary cyber security program in Australia with four fields of studies. Only state of the art cyber security facilities in Australia. We have the largest number of CVEs listed on Microsoft and other major vendors for a university in Australia.

  7. Doctor of Philosophy (PhD)

    Students: Find out about Doctor of Philosophy (PhD) - Cyber Security at UNSW Sydney - University of New South Wales. Doctor of Philosophy (PhD) - Cyber Security course details. 57672288. ... Australian Defence Force Academy, Northcott Drive, CANBERRA, Australian Capital Territory, 2600, CANBERRA, Australia.

  8. Cyber Security PhD Projects, Programmes & Scholarships in Australia

    UNSW Sydney School of Computer Science and Engineering (CSE) A PhD scholarship is available for applicants with outstanding research potential and an interest in quantum-safe security measures for IoT deployments. Read more. Supervisor: Dr A Shaghaghi. Year round applications PhD Research Project Funded PhD Project (Students Worldwide) 1.

  9. Postgraduate

    Our PhD Cyber Security students PhD Students (Canberra) Name Email address; Matthew Anderson ... Sydney NSW 2052 Australia Telephone: +61 2 93851000. UNSW CRICOS Provider Code: 00098G TEQSA Provider ID: PRV12055 ABN: 57 195 873 179. Acknowledgement of Country.

  10. UQ Cyber

    Delve deeper into cyber security expertise, complete a PhD in the field alongside some of Asia Pacific's brightest cyber security minds. To apply for a Doctor of Philosophy, visit Future Students and follow the steps. ... 8 in Australia for computer science and information technology.

  11. Cyber Security Programs and Courses

    Cyber Security Programs and Courses. The University of Newcastle offers a range of courses that include study in the area of Cyber Security: PhD in Cyber Security; Master of Cyber Security; Graduate Certificate in Cyber Security; Bachelor of Computer Science with a Cyber Security Major

  12. Cyber Security Cooperative Research Centre (CSCRC) Graduate

    The Cyber Security CRC (CSCRC) aims to inspire the next generation of cyber security professionals through working with some of the best cyber security researchers in Australia, and engagement with the CSCRC Industry and Government participants.. The goals of the CSCRC is to be an independent and collaborative centre where industry, government and research partners work together to create new ...

  13. Cybersecurity

    Our partners: Dr Caren Han (University of Western Australia), Ben Doyle (Thales Australia) PhD student: Fariza Rashid. Industry partner: Defence Innovation Network. Cyber threat intelligence has evolved significantly over the last few years, and many organisations have the practice of sharing intelligence with other peer organisations.

  14. PhD study

    The National Security College PhD program develops experts in security policy with strong research skills. As a PhD student you'll work with increased independence, under the direction of a supervisory panel of experts in the field. Your research will make an original and important contribution to human knowledge, research and development. Each PhD student is supervised by an academic with ...

  15. Cyber Security, Ph.D.

    The Cyber Security program at University of New South Wales is intended to prepare candidates for the highest level of professional practice, in which they can contribute significantly to the development of the multi-disciplinary study of cyber security. University of New South Wales. Canberra , Australian Capital Territory , Australia.

  16. Cyber Security in Australia: 39 Best universities Ranked

    Robotics 27. Software Engineering 38. Telecommunications 39. UX/UI Desgin 28. Web Design and Development 25. Below is the list of 39 best universities for Cyber Security in Australia ranked based on their research performance: a graph of 2.3M citations received by 101K academic papers made by these universities was used to calculate ratings and ...

  17. Defence Cyber and Space Careers

    Defence Cyber and Space Careers. There's no greater reassurance for our community than knowing we're well prepared to prevent or avert threats to our security. As the no.1 STEM university in South Australia we offer a range of degree programs that will put you on the fast-track to launch a career in defence, cyber security or Australia's ...

  18. 12 PhD scholarship positions in Cybersecurity and Cryptology University

    An exciting multiple PhD scholarship positions currently open for interested students with strong and outstanding research potentials to undertake research in Cybersecurity and Cryptology at University of Wollongong, Australia. The scholarship is available for outstanding applicants who are interested to conduct research in digital finance ...

  19. Industrial Control Systems & SCADA Cyber Security

    Australian Centre for Cyber Security (ACCS) is an internationally recognised interdisciplinary research and teaching Centre, specialising in a broad range of areas in Cyber Security. ACCS is seeking prospective PhD students that are interested to undertake in the newly available research project of Industrial Control Systems (ICS) and SCADA ...

  20. Doctor of Philosophy in Cybersecurity (PhD-CY)

    As a graduate of National University's Doctor of Philosophy in Cybersecurity (PhD-CY), you'll be able to: Advance theory and practical applications of cybersecurity. Formulate cybersecurity governance, policy, risk, and compliance. Assess internal and external threats and vulnerabilities to reduce organizational cyber risk.

  21. Cyber Security CRC Scholarship Opportunities

    Successful candidates would be awarded a Cyber Security CRC research scholarships or post doctoral fellowships. For further details see: Cyber Cooperative Research Centre Graduate Scholarship.pdf. Cyber Cooperative Research Centre Postdoc Fellowship.pdf. UNSW Canberra has a long standing relationship with Penten €" a Cyber Security CRC ...

  22. 599 phd-information-security positions in Australia

    Grant-Funded Researcher (B) CREST 1 - School of Computer Science. University of Adelaide | Adelaide, South Australia | Australia | about 16 hours ago. contribution of 17% superannuation applies. Full Time | 18 Months Fixed Term Opportunity The School of Computer Science offers high quality accredited degrees in computer science, and software ...

  23. 10 cyber-security scholarships in Australia

    2023 and 2024 International Australian Alumni Scholarship. Engineering (I59); Master of Engineering Science (J63). Science Master of Bioinformatics (I77); Master of Computer Science (I45); Master of Cyber Security (L33); Master of Data Science (I97); Master of.

  24. Introducing CDL-Melbourne's first graduates

    May 29 2024. Hackhunter CEO Tracie Thompson during a CDL-Melbourne session. Eight phenomenal ventures seeking to step onto the world stage have emerged as the inaugural cohort of Creative Destruction Lab Melbourne (CDL-Melbourne) at Monash Business School. The technology varies widely, from energy solutions to electrochemical technology ...