Cyber Security Bootcamp

by UNSW Sydney Claim Listing

This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

UNSW Sydney Logo

img Duration

Please Enquire

Course Details

This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.

 

Overview:

The course is centred around the crucial and relevant cyber security skills and techniques needed to protect and defend your organisation’s business assets and information systems.

Training is delivered in a boot-camp style format and with integrated hands-on lab exercises designed to give you the chance to test your newly acquired skills.

 

Course Content:

  • Overview of Computer Science/IT

  • Networking Fundamentals

  • Open Source Intelligence

  • Cyber Security Knowledge Domains

  • Roles of cyber security professionals

  • Cyber Security Threat Modelling

  • Real world case studies

  • Information resources for staying current

 

Learning Outcomes

Skills/competencies/knowledge that would be gained through this course:

  • Understand the cyber threats and vulnerabilities of computer networks, protocols, applications and network equipment.

  • Understand how cyber professionals apply cyber security frameworks to defend against threats and manage risks.

  • Understand common attack vectors, different classes of attacks and types of cyber attackers.

  • Understand how cryptography works to protect information

  • Understand the role of professionalism and ethical conduct and its ramifications on working relationships and society.

  • Understand future trends in the cyberspace that can increase risk and understand how professionals can plan for currently understood future threats.

  • Understand the role of key industry frameworks (in particular, NIST CSF, ISO 27001 and (ISC)² frameworks in cyber security.

  • Use Linux command line tools to determine network content, passwords and vulnerabilities.

 

Who should attend:

  • This is an entry level course for potential cyber security professionals or for those managing and leading cyber security professionals. The course assumes participants are competent computer users and assumes no Cyber Security knowledge.

 

Prerequisites:

  • None

  • Canberra Branch

    Defence Force Academy Northcott Drive ACT 2600, Canberra
  • Sydney Branch

    High St Kensington NSW 2052 , Sydney
  • Teacher's Name
  • Matt O'Kane, Roger Smith, Edward Farrell
  • Teacher's Experience
  • Matt O'Kane - Matt O'Kane is Director of Notion Digital Forensics in Sydney. Notion provides digital forensics and cyber-security services to legal professionals, businesses and individuals throughout the world. Matt draws on his experience in detailed investigation of cyber incidents to show you common pitfalls to avoid. Using his experience, Matt has trained cyber forces and cyber professionals throughout South East Asia using the latest material from real cases. Roger Smith - Roger Smith is NOT your traditional business security, risk management and cybersecurity lecturer! Employing skills from his former defence career including teaching, collaboration and communication, Roger has achieved world-wide recognition as an industry influencer and innovator in his chosen field of cybersecurity and risk management. Roger Smith is funny, scary, on point and is focused on one thing - increasing everyone's awareness and understanding of the problems and issues associated with the digital or cyber world. Roger is a veteran and an expert at creating and managing personal, digital and business security solutions for home users, SME's, large organisations, government departments and not-for-profit organisations. He is focused on building them into more secure and resilient environments. Roger knows that the only way to defeat the cybercriminal, channeling the teachings of Sun Tzu, is to understand our enemy and how they target us. To ensure that, our organisations and / or our clients need to improve our security so that we are not the low hanging fruit in the digital world. Ed Farrell - Edward Farrell is a security consultant with 12 years experience in cyber security and 17 years in technology. As the director of one Mercury, he has conducted or overseen the delivery of over 700 security assessment activities and incident responses in the past 7 years. His professional highlights include lecturing at the Australian Defence Force Academy, being rated in the top 200 bug bounty hunters in 2015 and running an awesome team of security professionals.
  • Gender
  • N/A
  • Teacher's Nationality
  • N/A

Check out more Cybersecurity courses in Australia

Box Hill Institute Logo

Information Technology

This course is designed to give you the skills you need to begin your career in Information and Communications Technology (ICT). The course has a focus on cyber security. You'll learn a broad range of skills from cyber awareness, teamwork, networking, programming and threat assessments.

by Box Hill Institute [Claim Listing ]
Housley Logo

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.

by Housley [Claim Listing ]
ALC Training Logo

Cism® Certified Information Security Manager

CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management

by ALC Training [Claim Listing ]
Kangan Institute Logo

Certificate IV in Cyber Security

Cyber Security skills are in high-demand for every organisation and is one of the fastest growing professions.

by Kangan Institute [Claim Listing ]
Coding Kids Logo

Cybersecurity

Security, Linux and Hacking Games is a cyber security course for 14-16 year olds who are interested in learning about security and Linux fundamentals through "hacking" games. This can be attended by beginners new to Linux. No prior experience required.

by Coding Kids [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy