Cyber Security Fundamentals
- Duration
- 5 weeks
- Delivery mode
- Online
- Location
- -
- Price (AUD inc. GST)
- $3,360
- Spots remaining
- AVAILABLE
- Course summary
- About
- Outcomes
- Schedule
- Next steps
Course summary
Build your cyber expertise
In this course, you will take your cyber security skills to the next level, with a self-paced five-week micro-credential, designed for the real world cyber security threat landscape. You will explore core security principles, governance risk and compliance frameworks, best-practice controls and hands-on lab sessions.
Who will benefit
- Professionals who know basic cyber security concepts, this includes those who completed the Cyber Security Bootcamp.
Course is suitable for
- IT professionals who wish to further specialise in cyber security fundamentals.
- Professionals leading teams that use technology in projects who want to learn the main ideas of cyber security and data protection.
Delivered by experts
About the course
The cybersecurity 101
Cyber Security Fundamentals provides a comprehensive foundation in core cyber security knowledge and practice. You'll be equipped with a deeper understanding of network protocols, system vulnerabilities and adversarial tactics. You also will develop practical skills in virtualised environments, security control assessments and applying established cyber security and privacy frameworks to real organisation contexts.
This short course provides graduates the knowledge, skills and analytical abilities required to navigate modern cyber threats and support secure and resilient digital environments.
Why enrol in this course
Build cyber security foundation
Learn the essential knowledge needed to navigate the evolving cyber threat landscape.
Flexible learning
Designed for working professionals, this self-paced course lets you balance learning with your other priorities.
Extend your career potential
Gain foundational skills boosts your career prospects and supports future upskilling pathways.
Key features
Study on your own schedule from anywhere — designed to fit around work and life commitments.
This course covers core cyber security concepts that align with real-world needs.
Build practical skills through lab sessions and exercises, giving you experience in real-life cyber security practices
Learning outcomes
Strengthening security skills
This short course introduces you to the evolving cyber threat landscape and the critical foundations of security, including the CIA triad and its real world application. You'll also explore key attach surfaces and vectors, whilst also analysing best practice in cyber governance, risk and compliance frameworks.
What you'll learn
Skills/competencies/knowledge that would be gained through this course:
- Understand the cyber security threat landscape.
- Learn how to apply the CIA triad.
- Discover cyber threat attack surfaces and vectors.
- Analyse best practise in cyber governance, risk and compliance.
Topics covered
This course maps to the following NICE Framework KSAs (Knowledge, Skills & Abilities):
- K0001: Knowledge of computer networking concepts and protocols, and network security methodologies.
- K0005: Knowledge of cyber threats and vulnerabilities.
- K0011: Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.
- K0019: Knowledge of cryptography and cryptographic key management concepts.
- K0044: Knowledge of cybersecurity and privacy principles and organisational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- K0049: Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarised zones, encryption).
- K0110: Knowledge of adversarial tactics, techniques, and procedures.
- K0113: Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
- K0160: Knowledge of the common attack vectors on the network layer.
- K0161: Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
- K0162: Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
- K0177: Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
- K0318: Knowledge of operating system command-line tools.
- K0332: Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
- S0073: Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.).
- S0147: Skill in assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.).
- S0242: Skill in interpreting vulnerability scanner results to identify vulnerabilities.
- S0367: Skill to apply cybersecurity and privacy principles to organisational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- A0119: Ability to understand the basic concepts and issues related to cyber and its organisational impact.
Course delivery
Format | Commitment | Delivery | Method |
|---|---|---|---|
Five weeks fully online | 6 hours of effort each week | Online | Self-paced |
Skills and career
Skills
Career roles
Course is suitable for