Organisations are constantly increasing their dependence on information technology – including migrating data to the cloud, IoT devices, mobiles and social platforms – and as a result, exposure to cyber risks rise. So, professionals who know how to assess and minimise vulnerabilities are in demand.
Introduction to Cyber Security is an online professional development program that will provide you with the skills and knowledge required to understand the concept of cyber security, types of threats and defensive mechanisms.
Throughout this cyber security course, you will learn how to perform a vulnerability assessment, understand the impact of online digital footprints and how firewalls, IDS and IPS systems protect computers and networks.
You will also learn about cryptography, wireless data communication networks and security standards and the importance of implementing access control models.
On completion of this course, you will have developed a comprehensive understanding of the importance of digital literacy to improve privacy and protect businesses from potential cyber threats.
Course Structure
Unit - Cyber Security
Unit 1 – Introduction to Cyber Security and Cyber Attacks/Defences
- The importance of cyber security
- Threats to cyber security
- Active attacks
- Common types of attacks
- Injection attacks
- DoS
- Malware, or malicious software
- Spoofing
- Man-in-the-middle
- Operating systems attacks
- Network attacks
- A layered approach to defence mechanisms
- Physical security
- Software and operating system security
- Network security
Unit 2 – Vulnerability Assessment
- The concept of vulnerability assessment
- Assessing vulnerabilities
- Security posture
- Performing a vulnerability assessment
- Identifying assets and classifying them
- Threats and risk assessment
- Baseline reporting
- Penetration testing
- Techniques
- Penetration testing vs vulnerability assessment
Unit 3 – Securing the Facilities and Networks
- Securing a data centre
- Securing the network
- Hardware – modem/router level
- Changing router settings
- Software pc and device level
- Preventative steps
- advanced setting to secure your devices
Unit 4 – Securing Your Online Digital Footprint
- Digital footprints
- Social media
- Web browsing history and online shopping
- Devices used
- The importance of managing a digital footprint
- Protecting the user’s reputation
- Deciding where and how personal information is shared
- Preserving freedoms
- Preventing financial losses
- How to manage a digital footprint
- Understand the privacy risks of online identities
- Developing better online habits
- Investigate default settings for online tools and services
- Using privacy-enhancing tools
Unit 5 – Internet Security and Digital Certificates
- Digital certificates
- Digital signatures
- DRM (digital rights management)
- IRM (information rights management
- Electronic books and magazines
- IRM/EDRM
- Generating a digital certificate
- Exchanging a digital certificate
- Verifying a digital certificate
- Web browsing (SSL certificates)
- SSL/TLS handshake
- Security issues
- Secure web browsing using https
Unit 6 – Wireless Network Vulnerabilities, Attacks and Security
- Types of wireless data networks
- NFC and bluetooth networks attacks
- NFC Networks Attacks
- Bluetooth Networks Attacks
- WLAN (Wireless LAN) attacks
- Introduction to network “blurred edges”
- Wireless data replay attacks
- Wireless DOS (Denial Of Service) attacks
- Rogue Access Point
- Attacks on Home WLANs – War Driving and War Chalking
- Wireless security vulnerability and solutions
- IEEE Wireless Security Vulnerabilities
Unit 7 – Firewalls, IDS and IPS
- Cyber threats’
- Packet filtering firewall
- Application/proxy firewall
- Hybrid firewall
- Firewall limitations
- Formats of firewalls
- Hardware-based and software-based firewalls
- UTM appliance
- Intrusion detection systems
- Network intrusion detection systems (NIDS)
- Host-based intrusion detection systems (HIDS)
- Intrusion prevention systems
- Detection methodologies
- Anomaly based IDPS
- Signature-based IDPS
Unit 8 – Cryptography
- What is cryptography?
- Definition, terminology and characteristics
- Common cipher attacks
- Cryptographic algorithms
- Symmetric encryption
- Asymmetric encryption
- Discovering keys
- Hash algorithms
Unit 9 – Access Control and Authentication
- What is access control?
- Definition and terminology
- Access control models
- Implementing access control
- Group policies
- What is authentication and authorisation?
- Securing and protecting passwords
- Multi factor authentication
Unit 10 – Cyber attack Disaster Recovery Strategies
- Response plans
- Using specialists and experts
- 5 phases – after a cyber-attack has occurred
- Cyber Attack Recovery Planning and Preparation
- Backup procedures
- Monitoring and logging of events
- Containment of attack
- Assessing Damage/Loss Caused
- Recovery procedures
- Authorities and Tracking Down Attackers
- Data and Security Policies
Unit 11 – Ongoing Security Management
- Managing security events
- Events monitoring
- Centralized vs distributed data collection
- Being organised
- Understanding the workplace
- Security and decision making
- Division of responsibilities
- Time management
- Networking
- Procedures
- Products and services
- The law
Study Hours
Estimated duration 50 hours
Course Delivery and Start
Start anytime, self-paced and 100% online
Assessment
Assessment will be comprised of written exercises, including short-answer questions, reflective tasks, short reports and/or projects. There are no examinations or due dates for assessment. As a result, you can complete training in your own time and at your own pace with the assistance of unlimited tutor support.
Testimonials
About Us
Graduation
A Certificate of Attainment and Statement of Results will be issued upon successful completion of this course.
How to Enrol
Enrol Online: Enrol Now
Enrol via Live Chat (Business Hours)
Enrol via Telephone 1300 76 2221 (Business Hours)
Enrol via Purchase Order/Tax Invoice
Enrolling Multiple Staff?
To enrol multiple staff, please complete the Employer Enrolment Form. We’ll be in touch within 60 minutes during business hours!
Payment Options
Visa, Mastercard, BPAY and EFT/Direct Deposit. Please allow 1-2 Business days for processing for EFT and BPAY.
Course FAQs
Why Choose Australian Online Courses?
- Professional development that is widely recognised and respected;
- Improve your employment opportunities;
- Study online, anywhere via our elearning system;
- High-quality professional development programs written by industry experts;
- All course materials provided online – no textbooks to buy;
- Unlimited tutor support via email;
- We offer twelve (12) months’ access, with extensions available upon application (fees apply);
- Course may be tax deductible; see your tax advisor.
Are there any entry requirements or pre-requisites?
There are no course or subject pre-requisites for entry into our programs. However, our professional development programs are generally intended for people over the age of 18. In some circumstances, enrolments from younger people may be considered. Please complete the AOC Parent Guardian Consent Form prior to enrolling and submit here.
Are there any computer requirements?
To study online with Australian Online Courses you will need a computer (desktop PC/laptop) running a current/updated operating system with reliable high-speed internet access. You will need to use the Google Chrome browser to access your course.
When can I start this course?
You can start within 60 minutes during business hours when you enrol and pay in full with a credit card!
Credit card: Within 60 mins during business hours.
BPAY: Within 1-2 working days.
Internet Banking: Within 1-2 working days.
Cheque/Money Order: Upon receipt of mailed cheque.
How is this course delivered?
This course is delivered online via our easy-to-navigate Learning Management System (LMS), where you will discover interactive online learning/written content, resources and assessment.
Do I need to attend classes or undertake any work placements?
No. All courses are delivered online via our LMS and there are no work placement requirements in this course.
What support can I expect from Australian Online Courses?
Unlimited tutor support is available throughout your studies via email only during business hours Monday to Friday. Our Administrative team are available Monday to Friday via email, live chat and telephone.
I am an international student. Can I enrol into this course?
Yes! We accept enrolments from individuals both within Australia and internationally; location is no barrier to entry into our programs.