Master of Information Security and Digital Forensics

Security of computer systems and networks is a major concern for organisations and individuals. The Master of Information Security and Digital Forensics addresses the need for professionals in this field.

With the rapid expansion of the internet, cybercrime and malicious software deployments are on the increase. There is a need for security professionals who can protect assets and information by securing networks and computer systems. The Master of Information Security and Digital Forensics also develops skills in discovering and recording digital forensic evidence of crimes and malicious behaviour by extracting data from networks, hard drives, cell phones and other digital devices.

Start date: 2018

Start date: 2019

This programme brochure will be available soon.

Minimum entry requirements

  • Bachelor of Computer and Information Sciences (or equivalent) with a B grade average in level 7 papers
  • May be required to supply references and attend a selection interview

English language requirements

  • IELTS (Academic) 6.5 overall with all bands 6.0 or higher; or equivalent

The programme offers a choice of two pathways to complete the required 180 points and is primarily a mix of security and digital forensics papers with some elective papers available. You can choose to complete six papers and undertake a 90-point thesis, or eight papers and a 60-point project.

The programme is a mix of academic study and practical labs supported by workshop sessions. Dedicated specialist hardware and software is provided for students’ use in these sessions and is available to them for the research component of the qualification.

Complete the following papers

And choose at least 30 points from

And choose one of the following options

Option 1

Option 2

Or any other postgraduate paper with the approval of the programme leader

More details about papers in this programme

Detailed programme structure and paper outlines (Blackboard)

Search for a paper (Arion)


Enrolment in papers is subject to meeting all requirements and availability of papers.

  • Computer forensic and security specialist
  • Computer forensic technician
  • Corporate and business IT forensic and security personnel
  • Forensic analyst
  • Forensic technology investigator
  • Forensic computer examiner
  • Forensic computing specialist
  • Electronic forensic investigator
  • Independent IT forensic consultants
  • Information security specialist
  • Information system auditors
  • Members of computer emergency response teams
  • Members of high technology police units
  • Network and IT system administrators
  • Software developers and architects

The information on this page was correct at time of publication. For a comprehensive overview of AUT qualifications, please refer to the Academic Calendar.