Course Summary
Who is this course for?
All businesses and employees
Course Duration
3 Days full time
Delivery Mode
Blended course delivery: mix of in-person and online
Course Structure
4 Units of Study
Prerequisites: NIL
Course overview
Protect your business and employees from the threat of cyber attack.
A cybercrime is reported every 6 minutes, on average and reported attacks increased by 23% in the last financial year.
All it takes is one person to click one link, and your business could be compromised. Increase your team’s cyber security knowledge and ability via a short course designed to equip all businesses from any industry with essential knowledge and skills to identify, limit impact, and report cyber threats.
Course outcomes
This course covers best practice for data protection and storage, identification of common fraudulent communications (scams, phishing, social engineering and more), password management and Personally Identifiable Information (PII) protection.
Possible career opportunities with this qualification:
-
Entry level Cyber Security Officer
-
Entry level privacy officer
Training Locations
Accredited Cyber Security training is scheduled year-round across Australia by Comtech (RTO90933)
New qualifications
Training timetable
Course updates
Subscribe to our accredited training newsletter
Course Content
Students will learn specific skills and knowledge to improve their personal cyber threat awareness and protect their organisation against increasing cyber risk. Content is relevant to all industries and all employees
4 Unit Microcredential
In this part of the course, the student will learn to identify existing and potential security threats to their own personal online profile by understanding how to do the following:
1. Determing where all their current online accounts and profiles are located
2. How to identify common threats to the security of their online profiles
3. Securely backup and restore data
In this part of the course, the student will learn the skills and knowledge required to identify and report online security threats to limit potential impact of cyber security breachers in the workforce by understanding:
Follow internal policies, procedures and plans relating to potential online security breaches
Learn how to identify features of common types of potentially fraudulent communications including scams, phishing, spam email/SMS text, social engineering
Learn how to implement techniques to verify suspicious requests for information including indicators of insecure connection to websites where data is being collected.
In this part of the course, the student will learn how to handle Personally Identifiable Information (PII) and workplace information responsibly by:
- Implement practices and procedures relating to workplace information
- Identify and manage sensitive data in your workplace environment including: identifying sensitive data, securely storing, sharing and managing customer information, encryption protocols, data classification, media and document labeling, monitoring and reporting faults and malfunctions in IT infrastructure.
- Apply best practice privacy policies to all data devices: includes password protections, storage locations and securely sharing information
In this part of the course the student will learn how to develop and promote a set of policies and procedures for their workplace. Coursework will cover legislative requirements relating to data protection, notifiable data breach legislation, Australian privacy laws; organisational policies and procedures relating to cyber security best practice, Australian government courses of information on current threats, strategies and techniques for promoting workplace cyber security and techniques to implement and promote cyber security in the workplace.