Organisations are constantly increasing their dependence on information technology – including migrating data to the cloud, IoT devices, mobiles and social platforms – and as a result, exposure to cyber risks rise. So, professionals who know how to assess and minimise vulnerabilities are in demand.
Introduction to Cyber Security is an online professional development program that will provide you with the skills and knowledge required to understand the concept of cyber security, types of threats and defensive mechanisms.
Throughout this cyber security course, you will learn how to perform a vulnerability assessment, understand the impact of online digital footprints and how firewalls, IDS and IPS systems protect computers and networks.
You will also learn about cryptography, wireless data communication networks and security standards and the importance of implementing access control models.
On completion of this course, you will have developed a comprehensive understanding of the importance of digital literacy to improve privacy and protect businesses from potential cyber threats.
Unit - Cyber Security
Unit 1 – Introduction to Cyber Security and cyber attacks/defences
The importance of cyber security
Threats to cyber security
Common types of attacks
Malware, or malicious software
Operating systems attacks
A layered approach to defence mechanisms
Software and operating system security
Unit 2 – Vulnerability Assessment
The concept of vulnerability assessment
Performing a vulnerability assessment
Identifying assets and classifying them
Threats and risk assessment
Penetration testing vs vulnerability assessment
Unit 3 – Securing the facilities and networks
Securing a data centre
Securing the network
Hardware – modem/router level
Changing router settings
Software pc and device level
advanced setting to secure your devices
Unit 4 – Securing your online digital footprint
Web browsing history and online shopping
The importance of managing a digital footprint
Protecting the user’s reputation
Deciding where and how personal information is shared
Preventing financial losses
How to manage a digital footprint
Understand the privacy risks of online identities
Developing better online habits
Investigate default settings for online tools and services
Using privacy-enhancing tools
Unit 5 – Internet Security and Digital Certificates
DRM (digital rights management)
IRM (information rights management
Electronic books and magazines
Generating a digital certificate
Exchanging a digital certificate
Verifying a digital certificate
Web browsing (SSL certificates)
Secure web browsing using https
Unit 6 – Wireless Network Vulnerabilities, Attacks and Security
Types of wireless data networks
NFC and bluetooth networks attacks
NFC Networks Attacks
Bluetooth Networks Attacks
WLAN (Wireless LAN) attacks
Introduction to network “blurred edges”
Wireless data replay attacks
Wireless DOS (Denial Of Service) attacks
Rogue Access Point
Attacks on Home WLANs – War Driving and War Chalking
Wireless security vulnerability and solutions
IEEE Wireless Security Vulnerabilities
Unit 7 – Firewalls, IDS and IPS
Packet filtering firewall
Formats of firewalls
Hardware-based and software-based firewalls
Intrusion detection systems
Network intrusion detection systems (NIDS)
Host-based intrusion detection systems (HIDS)
Intrusion prevention systems
Anomaly based IDPS
Unit 8 – Cryptography
What is cryptography?
Definition, terminology and characteristics
Common cipher attacks
Unit 9 – Access Control and Authentication
What is access control?
Definition and terminology
Access control models
Implementing access control
What is authentication and authorisation?
Securing and protecting passwords
Multi factor authentication
Unit 10 – Cyber attack Disaster Recovery strategies
Using specialists and experts
5 phases – after a cyber-attack has occurred
Cyber Attack Recovery Planning and Preparation
Monitoring and logging of events
Containment of attack
Assessing Damage/Loss Caused
Authorities and Tracking Down Attackers
Data and Security Policies
Unit 11 – Ongoing Security Management
Managing security events
Centralized vs distributed data collection
Understanding the workplace
Security and decision making
Division of responsibilities
Products and services
When you study with Australian Online Courses you will be assessed using a competency-based training method. Competency-based training focuses on a learner’s ability to receive, respond to and process information to achieve a competency result. As such, skills-based and knowledge assessments are geared towards attainment to meet industry-defined standards.
Assessment will be comprised of written assignments and exercises, including short answer questions, reports, essays, research projects and reflective tasks. There are no examinations or due dates for assessment. As a result, you can complete training in your own time and at your own pace with the assistance of unlimited tutor support.
Why Choose Australian Online Courses?
Professional development that is widely recognised and respected;
Improve your employment opportunities;
Study online, anywhere via our elearning system;
High-quality professional development programs written by industry experts;
All course materials provided online – no textbooks to buy;
Unlimited tutor support via email;
We offer twelve (12) months’ access, with extensions available upon application (fees apply);
Course may be tax deductible; see your tax advisor.
Are there any entry requirements or pre-requisites?
There are no entry requirements or pre-requisites for entry into this program.
How long will it take to complete this course?
The approximate study hours for this course is 50 hours. We offer twelve (12) months’ access, with extensions available upon application (fees apply).
Can I purchase optional printed materials?
While printed materials are not available for purchase, PDF copies are available for download and self-printing for this program.
When can I start this course?
You can start within 60 minutes during business hours when you enrol and pay in full with a credit card!
Credit card: Within 60 mins during business hours.
BPAY: Within 1-2 working days.
Internet Banking: Within 1-2 working days.
Cheque/Money Order: Upon receipt of mailed cheque.
Will I receive a certificate upon completion of this course?
Yes! You will receive a Certificate of Attainment upon successful completion of your assessment.
Do I need to attend classes or undertake any work placements?
No. All courses are delivered online via our e-learning system and there are no work placement requirements in this course.
What support can I expect from Australian Online Courses?
Unlimited tutor support is available throughout your studies via email during business hours Monday to Friday. Our Administrative team are available Monday to Friday via email, live chat and telephone.
I am an international student. Can I enrol into this course?
Yes! We accept enrolments from individuals both within Australia and internationally; location is no barrier to entry into our programs.