Cyber Security

Understand Cyber Security, types of threats resulting in cyber attacks, and defence mechanisms available. Contact us for details on when you can enrol.

Course CodeVIT103
Fee CodeS3
Duration (approx)100 hours
QualificationStatement of Attainment

It's Easy to Enrol

Select a Learning Method

I am studying from...

Enable Javascript to automatically update prices.

All prices in Australian Dollars.

Payment plans available.

Courses can be started at any time from anywhere in the world!

In today’s digital world where computers and electronic devices are at the centre of almost everything we do in our lives, it is more important than ever for every individual to ensure their digital information and devices are constantly protected against invisible attackers. This course introduces the concept of Cyber Security, explains various types of threats available resulting in cyber attacks, and develops your understanding of the defence mechanisms available.

New course in development - Available during 2018

Lesson Structure

There are 11 lessons in this course:

  1. Introduction to Cyber Security and cyber attacks/defences
  2. Vulnerability Assessment
  3. Securing the facilities and networks
  4. Securing your online digital footprint
  5. Internet Security and Digital Certificates
  6. Wireless Network Vulnerabilities, Attacks and Security
  7. Firewalls, IDS and IPS
  8. Cryptography
  9. Access Control and Authentication
  10. Cyber attack Disaster Recovery strategies
  11. Ongoing Security Management

Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.

Learn to assess vulnerability; then formulate and execute appropriate responses.

A vulnerability assessment often involves the 5 steps below:

  1. Identifying which assets need to be protected;
  2. Evaluating threats against those assets;
  3. Undertaking vulnerability appraisal to understand how susceptible the current protection method is;
  4. Assessing risks;
  5. Mitigating risks.

Need assistance?

Start Now!