Master of Information Technology
The aim of the programme is to enable Master’s graduates to gain a higher-level qualification, extending specialised knowledge, skills and expertise, and meet industry needs through increased relevance in critical fields of IT.
The Master’s degree positions graduates for specialist and leadership roles. For candidates considering an academic career through doctoral studies, progression from the Masters programme is possible, subject to a student’s performance meeting the entry requirements of the receiving institution.
Key dates
July 2024 Intake 22 • 07 • 24 November 2024 Intake 18 • 11 • 24 March 2025 Intake 31 • 03 • 25
View full calendarDuration
3 trimesters full-time or 6 trimesters part-time options, in Auckland, Wellington and Christchurch
Qualification
Master of Information Technology, 180 credits
Costs
Domestic $13,101 + $450 Student Services Levy International $36,000+ $450 Student Services Levy Fees indicated are for 1st year of study. Next 6 months fees may vary. All 2024 fees are subject to change and regulatory approval.
View full feesMaster of Information Technology Course Outline
The Master of Information Technology (MIT) is a 180-credit postgraduate programme taken over three trimesters full-time (1 year). It builds on the three-year Bachelor's degrees in the same academic field. Two specialisations are offered: Cyber Security and Data Science.
Certain specialist courses are 85% aligned with world-leading IT industry certifications, such as network defence essentials, ethical hacking essentials, digital forensic essentials, and Certified Chief Information Security Officer. Students enrolled into this programme will get a chance to obtain these certifications free of cost.
Master of Information Technology
The Master of Information Technology is a 180 credit programme, consisting of three trimesters full-time.
Semester 1:
4 courses of 15 credits each
Core courses:
- Research Methods and Skills
- Technology Management
AND 2 elective courses
- Cyber Security
- Data Analysis
- Machine Learning
- Ubiquitous Computing and Intelligent Systems
Semester 2:
2 courses of 30 credits each
Core courses:
- Special Topic
AND 1 elective courses
- Information Security Standards and Operations
- Data Science: Introduction, Management and Practice
Semester 3:
1 course of 60 credits
Core course:
- Project
Compulsory Courses
Research Methods and Skills (15 credits)
To formulate a research proposal with focused questions developed through analysis, and appropriate research methods for gathering, evaluating and reporting data to support inquiry.
Indicative Contents:
- Scientific method
- Types of Research (Historical, Descriptive, Correlational Studies, Experimental research)
- Legal, cultural and ethical implications of research
- Searching and analysing the related material (internet search)
- Research question writing – steps to follow
- Design of experiments
- Design Thinking
- Statistical techniques for analysis
- Bibliographic Tools
- Introduction to Latex
Technology Management (15 credits)
To review, select, implement and optimise existing strategies for managing technology within corporate environments, including the use of cloud deployments for competitive business advantage and apply advanced knowledge of IT service management, technology maturity models, information management, including the application of information governance, current laws and regulations.
Indicative Contents:
- Detailed understanding of Technology strategy; how it underpins and facilitates the execution of business strategy.
- Identification and the execution of technology roadmaps to meet current gaps and future demand from business
- IT Service Management (ITSM) theory and IT Infrastructure Library (ITIL) frameworks for management of Technology operations
- Technology root-cause-analysis and solution exploration as part of technology problem solving
- Data Lifecycle Management (DLM). Strategies and management of data acquisition, backup and recovery, metadata tagging, data maintenance, archival and retention, purging and operational risk & compliance
- Ethical and social impact of IT solutions on IT business
- NZ Privacy Act, GDPR and CCPA laws, and the ability to undertake Privacy Impact Assessment (PIA) and influence existing systems usage and creation of new data systems
- Privacy by Design theory, and the ability to apply Privacy by Design (PbD) framework to new data driven solutions.
- Pros and Cons of data anonymisation techniques with guidance on what to use for given situations
- Measures of data anonymisation risk; k-anonymity, governance, and ongoing compliance measures
- Operational management, change management, organisational behaviour analysis.
Special Topic (30 credits)
To undertake an in-depth investigation in emergent areas of IT, practical or theoretical, to build maintain currency, competence and expertise.
Indicative Contents:
- Individual and small group tutorials in relevant subject topics
- Revision of research methodologies including the impact of legal, cultural, ethical and social practices.
- Literature reviews
- Academic writing
- Preparation for the oral presentation
Elective Course:
Cyber Security (15 credits)
To protect the data and integrity of computing assets with the knowledge, tools and techniques used in Cyber Security to evaluate systems and technology from a security perspective, classifying threats and underlying risks and their management.
Indicative Contents:
- Cyber Security Principles
- Risk Management for Cyber Security
- System Security
- Public Cloud Security
- Cryptography
- Ethical Hacking
- Disaster Recovery and Incident Response
Data Analysis (15 credits)
To develop data analytical skills and data-driven mindset to provide deep knowledge of data visualization tools, analytical techniques and common web analytical tools to perform a comprehensive analysis of different data types using various techniques. To interpret data and results for a non-technical audience.
Indicative Contents:
Introduce and practice data visualization tools including Visual Basic for Applications (VBA) in Excel and Tableau.
Understand data:
- Relationships between variables
- Detect and analyse outliers
- Recognise and examine data trends
- Create and evaluate hypotheses for the future and/or population
Demonstrate and apply data analytical techniques for data types:
- Regression
- Classification
- Cluster analysis
- Association analysis
- Web analytical tool (Google
- Analytics) and its application
- Part of contents can cover briefly about Weka
- Build machine learning process
- Train data
- Evaluate results
Machine Learning (15 credits)
To develop important insights into data and formulate an in-depth classification of the internal mechanism of machine learning algorithms, principals, and techniques. To analyse and evaluate the performance results of machine learning algorithms for real-world problems and design appropriate solutions with a profound demonstration of mathematics and statistics.
Indicative Contents:
- Supervise ML
- Un-supervised ML
- Regression
- Model Generalisation
- Neural Networks
- Support Vector Machine
- Dimensionality Reduction and Anomaly Detection
- Recommender Systems
- ML for Large Datasets
Ubiquitous Computing and Intelligent Systems (15 credits)
To gain specialised knowledge of models and techniques used in ubiquitous computing and intelligent systems, to develop analytical skills for experiments and solution designs of real-life problems. To evaluate how computing can be integrated into the user’s environment and how technology becomes pervasive to create seamless interaction between humans and computers.
Indicative Contents:
Applications of Ubiquitous computing, Smart Devices, Environment and Interaction framework (Smart DEI Model)
- Modelling the key Ubiquitous Computing Properties, Interaction of Ubiquitous System with Environment
Smart Devices and Services
- Service architecture models (Multi-tier client service models, service oriented computing, device models)
- Service provision lifecycle (service announcement, discovery, selection and configuration)
Tagging, Sensing and Controlling
- Real world object tagging
- Physical and virtual tag management
- Modelling context aware systems
Intelligent Systems (IS) and Artificial Life
- Basics of Intelligent System leading to the Architectures of IS
- (such as Reactive intelligent system model, Environment model based intelligent systems, Goal based Intelligent Systems, Utility based intelligent systems, learning based intelligent systems, Hybrid intelligent systems
- Semantic Knowledge Based Intelligent Systems
- Intelligent Systems with Classical Logic
- Soft Computing IS Models (overview of probabilistic networks and fuzzy logic)
- Interaction Multiplicity
- Applications of intelligent interaction
- Autonomous Systems and Artificial Life
- Reflective and Self Aware systems
- Self-management and Autonomic Computing
- Complex Systems
- Artificial Life
Internet of Things
- IPV6
- 6LoWPAN, CoAP and MQTT
- Understanding the Contiki which is an OS to operate small (low powered)
Information Security Standards and Operations (30 credits)
To provide in-depth knowledge of key components in the areas of cyber-attacks, countermeasures, computer, web, and network forensics, including ethical, legal, and social considerations of IT industry to conduct independent research and working with advanced cyber security tools to implement standards and practices.
Indicative Contents:
- Network, Information Security and Ethical Hacking Fundamentals
- Data Security using Identification, Authentication, and Authorization
- Network Security Controls: Administrative, Physical, Technical
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile and IOT Device Security
- Cryptography and PKI
- Network Traffic Monitoring
- Password Cracking Techniques and Countermeasures
- Social Engineering Techniques and Countermeasures
- Network-Level Attacks and Countermeasures
- Web Application Attacks and Countermeasures
- Wireless Attacks and Countermeasures
- Mobile Attacks and Countermeasures
- IoT Attacks and Countermeasures
- Cloud Computing Threats and Countermeasures
- Penetration Testing Fundamentals
- Computer Forensics and Investigation Process
- Understanding File Systems
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Network and Operating Systems Forensics (Windows & Linux)
- Investigating Email Crimes
- Malware Forensics
- Governance & Risk Management (Policy, Legal & Compliance)
- Understand the essentials of Risk management and risk treatment. Comply with the IT audit process and IT audit standards.
- Information Security Controls, Compliance, & Audit Management
- Comprehend the concepts of Information Security Controls, controls classification and guidelines and identify the acts, laws, and statutes of compliance management
- Security Program Management & Operations
- Understand the security operations program that defines the capabilities of an organization to identify security events, respond appropriately, and quickly restore operations to normal.
- Information Security Core Competencies
- Evaluate physical security mechanisms, examine the issues and recommend the countermeasures to safeguard the network infrastructure.
- Demonstrate the knowledge of different factors that help in the implementation of access controls and design an access control plan. Identify standards, procedures, directives, policies, regulations, and laws for physical security.
- Evaluate physical security mechanisms, examine the issues and recommend the countermeasures to safeguard the network infrastructure.
- Demonstrate the knowledge of different factors that help in the implementation of access controls and design an access control plan. Identify standards, procedures, directives, policies, regulations, and laws for physical security.
- Strategic Planning, Finance, Procurement, & Vendor Management
- Analyse, forecast and develop the operational budget of the IT department and understand how to design vendor selection process and management policy
Data Science: Introduction, Management and Practice (30 credits)
To provide an overview of data science and its applications in resolving contemporary real-world problems, including skills to collect, manage, manipulate, and analyse data sets using statistical software to design applicable solutions to industry standards.
Indicative Contents:
- Data Science Overview
- Data Technologies
- Data Science Workflow
- Big Data Problems and Solutions
- Descriptive Statistics Fundamentals
- Central Tendency
- Spread of the Data
- Inferential Statistics Fundamentals
- Data Distributions
- Data Formats
- The Data Science Process
- Data Cleaning
- Data Transformation
- Data Exploration
- Data Quality
- Data Privacy
- Data Visualisation
- Data Analytics
Project - Year 2
Project (60 credits)
To enable the application of relevant research methodologies to an independent research project in the field of interest and/or expertise. To select a problem, identify the gaps in existing studies, propose and develop novel solutions, evaluate and test the developed methods, and compare the results with existing state-of-the-art techniques.
Learning Outcomes:
- Advanced understanding of techniques and methodologies to conduct evidence-based research, including the impact of legal, cultural, ethical and social practices
- Review, critical analysis and understand existing studies (literature review)
- Data gathering, analysis and preparation techniques
- Advanced techniques for designing experiments
- Reporting and documentation of research findings
- Qualitative and quantitative measures for performance evaluation and comparison studies
Key Information for Students
NZ Government key information link for students, that provides more information to support your decision making for this programme
Admission Requirements
Domestic Student Entry Requirements:
- Completed application form
- Applicant must have one of the following:
- A recognised Bachelor's degree in Information Technology or a related discipline with a B- or higher average, OR
- A Bachelor's degree (Honours) in Information Technology or a related discipline, OR
- Graduate Certificate or Graduate Diploma in Information Technology or related field
- Special consideration may be offered for admission by the Deputy Chief Executive Academic based on evidence of academic capability and work experience
International Student Entry Requirements:
- Completed application form
- Passport copy
- Statement of purpose
- IELTS Academic overall score of 6.5 with no band less than 6.0 or equivalent
- Applicant must have one of the following:
- A recognised Bachelor's degree in Information Technology or a related discipline with a B- or higher average, OR
- A Bachelor's degree (Honours) in Information Technology or a related discipline, OR
- Graduate Certificate or Graduate Diploma in Information Technology or related field
- Special consideration may be offered for admission by the Deputy Chief Executive Academic based on evidence of academic capability and work experience
BYOD (Bring Your Own Device) Requirements:
This programme has Bring Your Own Device (BYOD) requirements, we recommend you follow the specifications listed as these will support you to be successful in your studies.
Required IT Specifications:
- The latest Windows is the recommended operating system, with regular updates across the programme of study.
Recommended IT Specifications:
Minimum Hardware requirements
- Intel® or AMD processor with 64-bit support; 2 GHz or faster processor with SSE 4.2 or later
- 16 GB RAM
- 500 GB SSD or higher hard drive with 10GB free space minimum
- Wireless capability 802.11n dual-band
- Up-to-date antivirus software
Minimum Operating System
- Windows 10 (64-bit) version 1809 or later; LTSC versions are not supported (a must for IT Students)
OR - Intel i5 or equivalent or above
- AMD Ryzen5 or equivalent processor
- Internet and unlimited data plan recommended.
Not Supported:
- Chromebooks
- Windows X or Windows S OS
- Tablets (except Windows Surface Pro or iPad Pro)
Faculty
Dr Muhammad Azam
Head of School, Information TechnologyMuhammad is an experienced computer engineer and is currently working as the Head of School for Information Technology at Whitecliffe Technology.
Continue readingDr Shahbaz Pervez Chattha
Programme Leader, School of Information Technology (Wellington)Shahbaz is an expert ICT professional with specializing in Communication & Networks, SDN, 5G & Beyond Networks, ISO 27001, PCI DSS, IT Infrastructure planning, designing and management, Information security governance, policy design and implementation.
Continue readingJohn Williams
Lab Assistant, School of Information TechnologyJohn has been an IT Trainer for over 30 years. John joined Whitecliffe as a Lab Assistant in 2023, after completing his Diploma in IT Technical Support. Prior to that John spent nearly 20 years delivering various Microsoft family product IT Training Courses as a Microsoft Certified Trainer (MCT).
Continue readingVivian Wang
Lecturer, School of Information TechnologyVivian is a dynamic professional in the field of Information Technology, with a Master's degree in Applied Computing and a background in Environment and Society.
Continue readingSana Alyaseri
Lecturer, School of Information TechnologySana is a seasoned professional with over 25 years of experience in university lecturing and technology-related roles.
Continue readingDr Simon Yusuf Enoch
Lecturer, School of Information TechnologySimon holds a PhD in Computer Science (specialising in Cybersecurity) from the University of Canterbury, New Zealand.
Continue readingDr Joseph Dang
Lecturer, School of Information TechnologyJoseph holds a Bachelor of Science degree in Information Technology from the University of Sciences at Ho Chi Minh City National University in Vietnam and a Master of Engineering in Information and Communication Engineering from Sejong University in Seoul, Republic of Korea.
Continue readingJun Han
Lecturer, School of Information TechnologyJun is a freelance web developer. Currently, she is working as an IT Instructor in the School of Information and Technology at Whitecliffe College.
Continue readingDr Seyed Hosseini
Lecturer, School of Information TechnologySeyed completed his Master of Information Technology from IIUM Malaysia in 2015 and PhD from Lincoln university New Zealand.
Continue readingDr Sarmad Soomro
Programme Leader, School of Information Technology (Christchurch)Sarmad has a PhD in Computer Science specialisation in Human-Computer Interaction
Continue readingBilal Ishfaq
Lecturer, School of Information TechnologyBilal is a computer scientist and a researcher committed to high quality teaching and implementation of state-of-the-art techniques in research activities.
Continue readingBevan Thomas
Lecturer, School of Information TechnologyBevan holds a BA in Chinese at Massey University and a Diploma of Business Systems from Whitecliffe, formerly known as Computer Power Plus.
Continue readingRob Nairn
Lecturer, School of Information TechnologyRob has been an IT professional for 20 years having managed and owned several IT and web development companies.
Continue readingPinal Shah
Lecturer, School of Information TechnologyPinal has experience in web design, graphics design, mobile application development and game development. He has obtained his master’s in information technology and held the position of Lecturer in Whitecliffe since June 2021.
Continue readingGeorge Tongariro
Lecturer, School of Information TechnologyGeorge has been teaching Information Technology (IT) within the tertiary sector for the last 20 years, He has been working at Whitireia Community Polytechnic, Tai Poutini Polytechnic and now Whitecliffe.
Continue readingWhere could this programme take you?
Graduates of the Postgraduate Diploma in Information Technology will develop an ability to solve Information Technology programmes in a systemic and coherent way with an emphasis on analysis and innovation.
Jobs related to this programme
- Cyber Security Manager
- Cyber Security Consultant
- Cyber Security Analyst
- Security Operations Centre (SOC) Manager
- Penetration Tester
- Security Information and Event Management (SIEM) Administrator
- Network Security Engineer
- Security Consultant
- Governance, Risk Management and Compliance (GRC) Consultant
- Technology Solutions Architect
- Senior Technology Advisor
- Senior Data Scientist
- Data Architect
- Big Data Engineer
- Business Analytics Specialist
- Data Visualization Developer
- Business Intelligence (BI) Engineer
- BI Solutions Architect
- BI Specialist
- Analytics Manager
- Statistician
Industry Partners
School of Information Technology
Talk to our team
If you would like to ask us a question or request more information, please detail your enquiry using the form below. If you would like you can contact us directly on 0800 800 300, email us or use the contact us form.