Updating Results

CyberTech Essentials- Cybersecurity Technical Training

  • Non-Award

A single breach can have huge consequences for a company, hurting the bottom line and causing disruption in the daily lives of millions of people. That is why the demand for security professionals continues to grow.

Key details

Degree Type
Non-Award
Study Mode
In person, Online

About this course

Course Overview
A single breach can have huge consequences for a company, hurting the bottom line and causing disruption in the daily lives of millions of people. That is why the demand for security professionals continues to grow. Get onboard-and develop an understanding of cybercrime, security principles, technologies, and procedures used to defend networks.
Practical demonstrations and examples will be shared during the training to empower the people in your organisation to understand the cybersecurity strategies they can adapt to combat the imminent and continuing cyber-threats.
  • Understand security controls for networks, servers and applications.
  • Learn valuable security principals and how to develop compliant policies.
  • Implement proper procedures for data confidentiality and availability.
  • Develop critical thinking and problem-solving skills using real equipment
  • Understanding the Cybersecurity Landscape
  • Compare and contrast types of attacks
  • Explain threat actor types and attributes
  • Importance of policies, plans, and procedures
    related to organisational security
  • Risk management processes and concepts
  • Popular Cybersecurity frameworks and standards\
  • Australian Signals Directorate (ASD) Essential Eight Maturity Model

Study locations

Perth

Online

Career pathways

Key Topics
  • Understand security controls for networks, servers and applications.
  • Learn valuable security principals and how to develop compliant policies.
  • Implement proper procedures for data confidentiality and availability.
  • Develop critical thinking and problem-solving skills using real equipment
  • Understanding the Cybersecurity Landscape
  • Compare and contrast types of attacks
  • Explain threat actor types and attributes
  • Importance of policies, plans, and procedures
    related to organisational security
  • Risk management processes and concepts
  • Popular Cybersecurity frameworks and standards\
  • Australian Signals Directorate (ASD) Essential Eight Maturity Model
    • Maturity levels (Zero, One, Two, and Three)
    • 8 Essential Controls:
      • Application control
      • Patch applications
      • Macro settings
      • Application hardening
      • Administrative privileges
      • Patch operating systems
      • Multi-factor authentication
      • Backups