Ïã½¶Ö±²¥

‹Ì]_sÜ6¶?…ê'gætvßÏ$NÚf&îíÔ™Þ3W¢wyÑ’Jrâo#ê¥%J¢K½\/^~DÁ»cyÊî¤÷w7Íö"}½¿KÙËýåååÝ/qÌã)ýÇ÷—wœ¼DRdôý'/ì@J&øU”d¤(Þ_eô¹üƒðôÏþ§G‘V½Šˆd$ÎÈžfﯞhRÿ(¯®î/£(ŠÔÿÜUY+ºþeOd/·`ž‹¢,ZrE±éÏí¯=‘"$QJJ¿¬¢ï¯žªýÿhRFDRR\E,}u{–Ñx0(.¢¸%´b%=]EGIŸß_Ý$‚—”—7‰¨dA‹›׿kd{ !¢Î„¯5DW÷#%ïnÈýÈ"ó?în2¦¡¹£"§ úm "75+ KN“)õß../àǧ}Ð.../.4Hê?QÚ7l¹¤åeóH[3ö9\œh)Y>StD³À]†¦Nuö¶¨^^\\\èŠ×P0_(¤Zꙺx{èjý®Ÿ…Œú¾³ãÈ’"®†¾[j-t$Ó _ƒ.° ¦†Aþ÷LìIÁ|h]Ži#ƒ°¡2âÕ(œ/¼¤’+N’E_É'¦ÆYM¸²3azg F ÏŒ ƒé#9pZ²$ú‹‚žÐèˉ?@àžZŽXv1ë8–£ KÅà†9¸Ã‡qÀäpVtÂN e<NôDy ùAŒã¼aŒOãrw Â1¯ ŒÎAÁ㣿Xñ="</¥¿Ï’ßcÂÓ8éè–{`* |JoÄwjH8ŸJIJz`Iôp$üP¿€y¦ÜÛ.]€(·c‹Å³ Ûr°Ñh€lg7º!Œgþøò·z<ž¾}cæ#{QÏYQ²U1³.X§5¢©+º]ñšEAV$‹¾©$ù+a®ÑÆeG»J“< RZ“a ®öK¢?(ÉÊ#ˆ­"Š-Ñ PuA(š:±F]ù@ÓÍ¥H«¤d/´UD½4¿QY²Œ•àó*5ÆÖFõ:>Œ+&:L8:óaÌS!F ¹Q$ŒdupJ‰LÀ§¼PduÈÛ’­˜ûƢйnLnžÛÆF„\JGì {a_UÇ'pí[æ¶ÖÖ,Ën͘0˜>¥à,‰>±‚’‚F;I_(·mIç GœkËQ†¥bpÜFÜaƒ9@œNg Ùg´W Y•$Oo·‡ŠM.ê ¯ÙÃÅÊÍœ±“â$ÔóSÏÒ‘œIÛé)ï˜ÔDEz¦Ñ´M0^Û˜Íñ¶ÍøPÑM;#=Òò(Ò"º~¤)K§ïฦa‰O K|}XÖD4±T<’õbÐä@ºÈXÉ’µ‰txÔ¶ùùuËŸ©04ZŸ2˜#ö©1a0ýMHÊ<úJø¡" AúÜÐÅYO·Ñ©, Ð)½Ï©!aàü$N´¨ó¿*Ø''–½F3‘Qž€Ð¦-O³¬P<ñKϳf›\ r¯~›áa\ñáD%Kº'£~ã๓´äýÓ–·äˈİ،°FÚØåÆ)•õæÈ'Zoéƒ;ºeœ¶”+¶rϤ¡»¸gæíÛ3ƒBm£•T2’ÑSÂÔ+X¿ešvðnZË £zŸ©Î¸fS Žï­!€-6ŒP?•‡W¥Ky¤Ñgþ¤à¶-6ª8”Í呯TçXó2@Rñ—â^Èà@ºØ‹².µ¨5ª÷¿³ŒjåŸ^‹’žÀlù”álà‹‹ŽoE¬ŽÈFCv„ß·#@„Ê-ð¢”USˆï?'¹§]g@$žL0²y£‘á§cp}Jôƒ·Y✩AÛl`°ÔY^•]i®Ùõ*'•Zì½³¤Ñþ×dÌ¿*¥Œ¡á\sÒJ´9ÁƉõþãIÓ¾·sÓ½N9Þà‘ŠCxâ)&ùuF$‚…¦+Ix‘ YF×õ¼šÑŸ]ˆ~iËŽ%¾N–n)±êû:ˆHEg6XóD›(ÞLÊ£Ïú#­ õ¬3^3U瑓ζ"»~.zŒ~5ÅÌ©w;áÊù»…ïþ,ä©©–iYÊx§=ã4>у¤ðvž¾üfƒÀ1Tõ™¤§ÀuǰA cÞºœ"Xd xÚ`Ö!×jTb™¡¤¥ó‘ šÊr[e ô–ÕÔ`H`8Gî~Ïå"é;ÝÑ3W lÀÖEw’o¡7+f÷„ƒ-9æsF“úôšŒ˜"@uFÏÎd/t¦Ü iX[€µ+ÀèQ¤õG”TÞÖ¾6,9ãSǦrÄë7ÓÑ·‹7?´ ³¡Ì5ZªËâ‰Õ*à5I0kÔªI0y·ñ‘‰æ-U²Ê»ý„c¸€T—`…P,TA¥(r’P´ê›t”^ ¿Ï¥¡ugæ’‡3ƒÂ'‹Ö|z×Ûjo$t9'£Œ/ð@S·¿·*5¯Ù;×h¾5»çòÛÇšà¹qþX+§¨l~ —¡þÎuEÔÍA‡¤^yÆå+Ïg—Œ~óíìæwÄŠÀæ6%¾W–>O/x„+75çîFÿÈjÏHIúj§ë‡#=©X¹ 1N"£I•ùΩܮ£«·ºNZY]t£ËòT§7«`ÏѼ¤ÏÖ­=.³ ˜¯YaÆìç¦åLG†Ÿ aÝЬŒˆ—Ì(¾“¾Ücö™$[«Ûtš$á¢Io³¤e÷€ßQÏ™•žž'ç¾`oñV-}™f½A[«÷q™àb_³8ÂŒÙÉMË™5?ág'H·¹Îz ÷,uÉ,'„Úæâ…ôÇY?ó²n-A9­dqd¹Û‹Ãz!íY‰±ï6ÐŒ×h–ÎÀþò è6\nà°õæ´1ïi'Îe¬a(/%Ø6Ý\7ìl4ÔwÌKÔï2’ë`žÖËxY€|r~Ÿßð‹¼ò+¼ä»²O+-#ñ};2~(œ?¬5[,žãR±yýŽNDϨg@³´w1ØŽcœ>‚Së½}ó&‚+€¬J9;$ø,­Š²>)«^Þ]Ó¬-©˜½ÀziêóÑv7k‹:ÞdsÀ}D÷,È2+/7Ðùñ^N?—tùrí¹dwÚµ2Ÿ·š¿Ñ#ýn.ÂNÐûs:Ò ÎÒzY€ ¸øOÂE‘ŒÖ»I%MŽ\dâ´ây½‹¥“/w óÀft`d¨Q?Æžpƒ¨ãÒu ¢&ÂnñQ CÔÄšmöUpK\a üe®Ð‘f¤®æi½¨Ã’Wj;ÁáµQ<žÞš©,´#Õ„ÞÜ…jbH¨¹=92N£¯”HníΣè⬧[3?eásð˜˜edž̀“4­}3e¢J£'ä¸rRSÅ>N,%¡UH#jsµÑÈ€@aò5/ÅA’üØlè~ÌDò=9w0N4ž¦ÊFçY°E. ·…× ¾Åð€ÝfRR Øã­4“Ñzõñ´[;}›!føC ´ª8¾‰Sû  ¥Äi\j¤«ë‡uq®§ t[±°nU ]ç×½d)výÓQQù¸òi, ÅsLnÞNYè±Ê°­ÂÏÊŒÈÍçc¹ó„º°­<u‰ÀŽ0_ÕRŹ¢Zsß•.é¿ÝJ'®²Ò-ØÄ=Žuu*êzc2ÐûºÅ±9óÇ^—;{3C­-äwZZ=ÁšÕD+äW|ÑR ˆö×@gß’DT܆Ñ(Vœu률x ¤æÃmýσҜd¯*gQ?ð«‚qZHHÚ²¨÷pß³¬HMboãQ/š­z»ÌWq`uSmìr™l [}·L/ëÖñn™žÁvµLoI °©óþh¹aïþÑ=1ãEÍúN 6¹x€ea6‡[ËuLbê^T°3R÷óŠHô[ÜÒ™{5¿½Âòõ_ѤoãÚ^ù:­÷ñÓÒ—~ëx›¥E„íBK$fLv`eݸ‚¦Œ€sdC¤®j!«fE]: êÄæ‰OW>Ð.)-ù½ÙùÄê’Š½JX ŸgÞò5½E>ŸhL6ºŠð›wR …ÐÙAHVO^ߎTHøž¸;h¤ˆWÖ&hˆmb2GÛ&ãe_÷Tb½X“1ÑŠŒ£.Ï5êÔæ,£Nêj˦ÚÎe³«åóµ—i’‡O„&à¾ËsËžŠûþªè‘$Öë/ա˱¬ÄÈÔˆ­ uV¥NVÕïÙC•••DŸm•ÝR¯sÒ2xxÀA¡·øù€8šXjÝÔX/DS›°ä‘ ‡õ²F ,”5íÃÖD v@œˆºu­}°9±bå%šs›k³ÛÅbáZo¢=?ÍíÜÅ ÀW 8ÆÌŠXW—ª€i£è/v8–HžH¶4kCœ[·TPC ç~ZÍi¢¤Mˆ<þœ±¤ŒžÊ*µ„àyÍÑL@-G\t+9RñÓN «ùØhqèÚÈŽÔпÚÃÔ™0÷îÙ¶M¦3c¶d‹®µØZÕ:&²âk:‘÷öI¸x4¤¯”ÜÔ’U)º)ÌŠžhs€ôLcLJà ñOºys:8Æ,'»jj®¨r„i{í4ÝÜhëTéÏ‘–Qf¹Ò]ÛÙ­5·àÎñ ]kdýæq>~~gÉjº.Íš„&â=­«ÇGiqÈ:j ¥ á ~ÝÐ'úÂZ´5TêœgáâÌîrŸ´áok·~_®´ŽáìH'M±ûˆ¬0m®«?â>K«|Žƒ¥»¹ ×nnÿ núŠ¡‹É,7tNïn‚¥»¹ × [86Õ¥uÐ$Å‹‹ ÙnÂ4›ÓÇ%°sžJY%e%¦¦¢'õâMœê†ñ¡Bæ©Ia°ý/9»ø9»vÑÒçR݇µ1â›»ëÃæxatu—ogŒ„»ùÕ¿Rl;^qè+†¸Ç¡¹™?᣸9Ï]Û¥mØ‚ºÓ¶¼Füh[Ø{p E¼›çô›qûA´^ †­W¶ùù8Ú‡pü\ºé¹à޹Àþ3µÀE|fê³ëÁO±n¾±èãÜõ7¸ÐÎêNA¼{ò6Ž»Û\5^Þ>¨cÏz´¡¢n<ë1éÅiçRÝ\kãÖúr㹜ÝòdNþ¦Ùœ|u:'_˜ÏÙ}Þø–ÅnýžEþlZäÞv-ò•Û»mï[ìÖn\äÿÀÎEîië"_µw±Ûfºu·4ßš¿aÂ5_™qÍ¥\ƒyèCúRw¾¨™nqßöY¨žI¹tšöH+EË0´])~|ç4’£#çim®°šß¶R¿»ù¹ßüM’¿ùâìo>3ý»Ûhþw·8œ{Ì/p ®Ý’|ðnû+ê%uþ­©s‹ê|õª:˜wµÖûA¤ÖëßSÄ8’èè³ðÅ7gæmd+w7c/7÷»™›ÏßÍÍ]·sw›Ë¿î$`ó·ÉÀæËS°ùÜìnÓ»•;ùÛoeä~ö2ò5›»­%\wó3®ù›¤\óÅ9×|fÒ5œޝ…JdÔÁ!ÉmgžZJ}¶”+?“†B}ÆaFøÌ ¬ÿœW}^×z³×xn+»mMës—ýiL{‹Óú€'H×¶;‰»uk}:â±´AY.º9Ô-@ÓècŲ´~`Ö³Åû–Í×㌈v t,ì`¬c!t`‡ó~‚x÷à Ù·uÎmî¹¶·8ǶôäÚ¬“jO¡³’HF&9ˆöÂàóhGoM%-ßÊÓê&ÙJ´Óñu‹fð‘v B=)jl\ç ¥§†ÖçÒЮáç,æXïÌ¢@«QIx‘ Z+Ö“¾žÒ¼(ì~…Áº»©²ûËÞìæ¯Íÿ«è1¹¼»áäåþòî—8¦<å‚ñ”þŒãûËËË»›”½ÜßÝìEúzwS«|ÿÿÿŒngBÝ
Skip to main content

Specialisation

Our Cloud Security specialisation provides theoretical, design, and practical skills that are required to design, deploy, and maintain highly secure cloud infrastructure.

Cloud security is an integral part of any cybersecurity portfolio, which is why both data and services are increasingly being moved to the cloud by industry organisations and governments.

Such data and services have widely become lucrative targets for attackers and in the last few years cloud security breaches have occurred on scales never seen before.

Graduate opportunities

Graduates of our Cloud Computing specialisation will posses the technical skills and ability to apply their expertise across a wide range of industries relating to IT, infrastructure, the financial and banking sector, and engineering services that rely on cloud infrastructure.

Career pathways
Courses that offer this specialisation

To commence study in the year

The course information on this website applies only to future students. Ïã½¶Ö±²¥ should refer to faculty handbooks for current or past course information.

To help you understand common terms that we use at the University, we offer an online glossary.