Cyber Security Awareness Skill Set

by Comtech Training Claim Listing

The Summer Skills program is an initiative of the NSW government designed to support 2022 school leavers and job seekers within NSW to boost their skills though fully subsidised short course training programs.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Comtech Training Logo

img Duration

5 Days

Course Details

This short subsidised course is your introduction to the concepts of cyber attack prevention, it is ideal for anyone who is interested in the following:

  • Protecting yourself from data or identity theft and de-risking personal financial loss.  

  • Protecting your data by training to become cyber aware at home, in public and in workplaces.    

  • Starting your career as a cyber security professional as these four units can form part of a full qualification in Cyber Security or network engineering. This course is your starting point in your career as a Network Engineer or Cyber Security Specialist

 

Course Outline

The Summer Skills program is an initiative of the NSW government designed to support 2022 school leavers and job seekers within NSW to boost their skills though fully subsidised short course training programs.

The program offers an opportunity for young people to upskill, prepare and get ahead through fee-free training courses.

 

Cyber Security Awareness Skill Set

Comtech Training are now taking enrolments for fully funded positions within the Cyber Security Awareness Skill Set program 

  • Course Code: BSBSS00094
  • BSBXCS302Identify and report online security threats 
  • BSBXCS402 Promote workplace cyber security awareness and best practices 
  • BSBXCS301 Protect own personal online profile from cyber security threats 
  • BSBXCS303 Securely manage personally identifiable information and workplace information

 

Course Content 

Part 1 

  • Protect your personal information and online profile
  • BSBXCS301 Protect own personal online profile from cyber security

In this part of the course the student will learn to Identify existing and potential security threats to their own personal online profile by understanding how to do the following:

Determine where all their current online accounts and profiles are located. How to identify common threats to the security of their online profiles. Securely backup and restore data

 

Part 2 

  • Working Cyber Smart in the workplace
  • BSBXCS302 Identify and report online security threats

In this part of the course the student will learn the skills and knowledge required to identify and report online security threats to limit potential impact of cyber security breaches in the workplace by understanding the following:

  • Follow internal policies, procedures and plans relating to potential online security breaches

Learn how to identify features of common types of potentially fraudulent communications including but not limited to:

  • Common types of online scams and security risks, including phishing scams

  • Common techniques of phishing and spear phishing used by attackers, including:

  • spam email and SMS text

  • social engineering, including telephone calls, social media and website requests for information

Learn how to implement techniques to verify suspicious requests for information including indicators of insecure connection to websites, in particular where data is being collected.

 

Part 3   

Identify online security threats and implement actions to secure and protect data including disaster recovery methods.

BSBXCS303 Securely manage personally identifiable information and workplace information and BSBXCS402 Promote workplace cyber security awareness and best practices

In this part of the course the student will learn how to handle Personally Identifiable Information (PII) and workplace information responsibly by understanding and demonstrating the following:

  • Implement practices and procedures relating to workplace information including the requirements relating to securely managing PII and workplace information

Identify and manage sensitive data in your workplace environment including:

  • identifying sensitive data

  • securely storing, sharing and managing customer information

  • encryption, and protocols for its uses

  • data classification

  • media and document labelling

  • monitoring and reporting faults and malfunctions in IT infrastructure

Apply privacy policies to all data devices incorporating Industry best practice including but not limited to:

  • password protection

  • storage locations

  • securely sharing

 

Course Eligibility 

To be eligible for a Summer Skills funded position you MUST meet all of the following:

  • 15 years old and over; AND

  • No longer at school; AND

  • Live OR work in NSW; AND

  • Australian OR New Zealand Citizen, Australian Permanent Resident OR a Humanitarian Visa Holder (International Students are not eligible)

AND meet ONE of the following:

  • Aged between 17-24 years old (regardless of employment status); OR

  • Centrelink benefit recipient; OR

  • Unemployed (you DO NOT have to be in receipt of any Commonwealth benefits or registered with Centrelink)

  • Newcastle Branch

    7/115 Griffiths Rd, Lambton NSW, Newcastle
  • Adelaide Branch

    491 – 499 South Road Regency Park SA, Adelaide
  • Hobart Branch

    Above AWM Hobart 27-29 Federal Street, Hobart

Check out more Cybersecurity courses in Australia

Canberra Institute of Technology Logo

Certificate IV in Cyber Security

The Certificate IV in Cyber Security is a technician level course. This qualification will provide you with knowledge and a range of technical skills to enable you to seek employment as a cyber security technician in a range of organisations and government bodies.

by Canberra Institute of Technology [Claim Listing ]
  • Price
  • Start Date
  • Duration
ITSM Hub Logo

CompTIA CySA+

CySA+ focuses on the candidates ability to not only proactively capture, monitor, and respond to network traffic findings, but also emphasizes software and application security, automation, threat hunting, and IT regulatory compliance, which affects the daily work of security analysts

by ITSM Hub [Claim Listing ]
ALC Training Logo

Cism® Certified Information Security Manager

CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management

by ALC Training [Claim Listing ]
Tafe NSW Aviation Studies Logo

Statement Of Attainment In Cyber Security

The Statement of Attainment in Cyber Security provides you with in-demand and highly sought-after skills valued among computer helpdesk technicians, cyber security support officers and information systems personnel. Support your organisation against threats and cyber risks in this growing industry.

by Tafe NSW Aviation Studies [Claim Listing ]
Housley Logo

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.

by Housley [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy