Explore your options
Come and learn about computing in the twenty first century with our state of the art labs and equipment.
We’re home to New Zealand's first Cybersecurity Research Centre. Opened in 2012 in collaboration with Japan's National Institute of Information and Communications technology (NICT), it's an example of cutting-edge technology being developed right here on campus.
There’s also the IBM Delivery Centre – the first in New Zealand – which opened at our Mt Albert campus in 2013. It’s an opportunity for our staff to work closely with IBM professionals to run student mentoring programmes and internships with one of the biggest names in business and IT consulting.
You’ll learn from passionate and knowledgeable lecturers. Our instructors are members of relevant industry organisations and have published in international journals. Some work as consultants to the IT industry and quite a few are involved in applied research - from high-speed networks and data mining to internet security and robotics.
Free4U computing classes
Our Free4U computing courses are also a great way to get into computing or develop your current computing skills. Whether it's for fun or to to prepare for the workforce, our friendly tutors will help you learn at your own pace.
Programmes and study path
|PROGRAMME||LEVEL||DURATION||CAREER OPTIONS||START DATES|
|Certificate in Information Technology||4||Full-time for one semester or part-time options available||Data entry operator||February, July|
|Diploma in Applied Computer Systems Engineering||6||Full-time for one year||Corporate mail systems administrator, Desktop support technician, Help desk technician, Microsoft systems administrator, Network administrator, Network engineer||February or July|
|Diploma in Information Technology Support||6||Full-time for two years or part-time options available||Desktop support technician, Help desk technician, Network technician||Starts February or July|
|Bachelor of Computing Systems||7||Full-time for three years or part-time options available||Applications programmer, Business analyst, Database analyst, Cyber-security analyst, Game or app designer, Information systems manager, IT support (hardware), IT systems administrator, Linux systems administrator, Windows systems administrator, Multimedia developer, Network administrator, Network and security analyst, Network designer, Tester, Network engineer, Internet and Web developer, Software designer||February or July|
|Graduate Diploma in Computing||7||Full-time for one year or part-time options available||Applications programmer, Business analyst, Project manager, Software developer, Internet and Web developer, Data analyst, Database analyst and developer, Cyber-security analyst, Network support technician, Network engineer, Network administrator, Systems analyst, Game programmer, Software tester, Software designer||February or July|
|Postgraduate Diploma in Computing||8||Full-time for one year or part-time for two to three years||Information systems manager, IT adviser, Multimedia development manager, Researcher, Network manager, Software engineer, Systems analyst, Website manager||Starts February or July|
|Master of Computing||9||Full-time for two years or part-time for three to five years||Information systems manager, IT adviser, Multimedia development manager, Network manager, Researcher, Website manager||Starts February or July|
|Doctor of Computing||10||Full-time for three years or part-time for four to six years||Practising professional working to advance the computing knowledge base||Starts February|
|Incidents and investigations for managers||3 hours||This course focuses on incident response and how you can build forensic investigation readiness into your business.|
|Protecting information||3 hours||This course covers the CIA (confidentiality, integrity and availability) model for information security.|
|Governance||3 hours||In this course we will discuss the risk management aspects of information security and the legal obligations that businesses have to ensure the security of individuals and business partners.|
|The mind of a cyber criminal||3 hours||To understand an attacker’s motivation you need to start thinking like a cyber criminal.|
|The current state of play||3 hours||This course provides an overview of the current state of play in information security, including types of attack, their costs to the business, and the rationale for such attacks.|
|Telecommunications and networks||3 hours||This short course focuses on the technical aspects of telecommunications and network security, and covers firewalls, intrusion detection systems, network monitoring and mobile security.|
|Day to day operations||3 hours||This short course shows you how to implement day-to-day security in your enterprise, and what checks to perform to gain insight in your security status.|
|Authentication systems||3 hours||This short course deals with access control and discusses the technical aspects of authentication mechanisms, authorisation, and accounting (‘logging’).|
|Software development considerations||3 hours||This short course focuses on cyber security considerations in the software design and development processes in a typical software development lifecycle.|
|Data and communications cryptography||3 hours||This short course details the technical aspects of cryptography and outlines which methods are available and how they work.|
|Incidents and investigations for IT professionals||3 hours||This short course concentrates on incident response and how you can build a forensic investigation. Find out how to ensure your company is ready to respond quickly to cyber security...|