Research Methods for Cyber Security

Postgraduate | 2026

Course page banner
area/catalogue icon
Area/Catalogue
COMP 5063
Course ID icon
Course ID
203334
Level of study
Level of study
Postgraduate
Unit value icon
Unit value
6
Course level icon
Course level
5
Study abroad and student exchange icon
Inbound study abroad and exchange
Inbound study abroad and exchange
The fee you pay will depend on the number and type of courses you study.
No
University-wide elective icon
University-wide elective course
No
Single course enrollment
Single course enrolment
No
alt
Note:
Course data is interim and subject to change

Course overview

This course will prepare students for advanced research in cyber security that aligns with professional standards and the recent qualitative and quantitative research methods and techniques used in the cyber community. Research will include the use of reports and investigations on recent cyber attacks. Students will be introduced to the steps required for a research project such as, formulating a research question, evaluating threats to validity, literature review, collecting and analysing qualitative and quantitative data and how to present your research outcomes. The course will particularly focus on how to effectively evaluate published cyber security research and communicate research results to peers and colleagues in the cyber security community.

Course learning outcomes

  • Analyse recent research methods and techniques used in the cyber security community to generate an effective research design.
  • Develop a research design and method (qualitative and quantitative) that aligns with professional standards and addresses recent reports and investigations on cyber attacks for a cyber security research project.
  • Formulate a valid research question using cyber security research methods and design techniques.
  • Develop a cyber security research proposal for an organisation that suggests how to prevent cyber-attacks.
  • Propose a solution to a cyber security research project using effective communication methods to disseminate the results to the cyber security community.

Prerequisite(s)

N/A

Corequisite(s)

N/A

Antirequisite(s)

N/A