IT Masters Detecting and Defending Against Cyber Threats

 

This course will take a practical approach to detecting and defending against cyber threats. Threat actors are evolving in their attack strategies and are increasing in frequency. Cyber threats can originate from almost any source; including nation states, organised crime, activist groups, and terrorist groups, to name a few. It is critical that appropriate and adequate strategies are in place to detect and defend against these threats.

Enrol Here

Use the form below to enrol in this short course, once submitted you will receive a signup email with login details for our learning site.

Course Schedule

 

The first week will introduce concepts on cyber warfare and cyber threats to set the scene for the following weeks. The current cyber threat landscape will be covered in detail.

Topics covered:

  • Current cyber threat landscape
  • Current threat actors

This session will cover key strategies for defending against cyber-attacks. This will include a combination of policy, process, and controls, which are considered the best industry practices.

Topics covered:

  • Passive and active defence
  • Security policies
  • Ethical hacking
  • Cyber security standards and frameworks

Assumed breach is a common strategy for cyber defence. Threat hunting became the common practice over the last decade; a practice that focuses on identifying indicators of compromise (IOCs) and detecting an adversary through analysing logs, packets, and other information in networks.

Topics covered:

  • Advanced persistent threats
  • Identifying indicators of compromise

In this final session, the future of cyber will be discussed. Emerging technologies will be explored and how they need to be defended from cyber threats, but also how those technologies could be used to advance current cyber capabilities.

To wrap up, the course content over the past 4 modules will be summarised.

<ul>
<li>Exam pass mark: 50%</li>
<li>Time limit: 1 hour</li>
<li>Attempts allowed: One</li>
<li>Format: 40 multiple choice questions</li>
</ul>

Course Information

 

Who will present the webinars?

This course was developed and presented by (soon to be Dr) Georg Thomas. Georg has over 20 years’ experience in information technology and cyber risk in Australia and the United States. He has worked within legal, financial services and insurance, government, and telecommunications media and technology industries for client of all sizes including Fortune 500 and AMLAW100 firms. He has a range of qualifications including CISM, CISSP, C|CISO, GIAC GMON, C|EH, MACS Snr CP (Cyber Security), and MCSE (Security) and completed his Masters of Management (InfoTech) and Doctorate of IT with Charles Sturt University. He is a member of the ACS Profession Advisory Board where he sits on the Ethics Committee, a former Board Director on the ISACA New York Metropolitan Chapter, and a 3-time Microsoft MVP award recipient.

 

What is the aim of this short course?

In addition to providing tools you can implement into your work life immediately, this short course will give you a ‘taster’ of what it is like to do online postgraduate study with Charles Sturt University.

This short course covers sections of the subject ITE534: Cyberwarfare and Terrorism taught by Georg Thomas, a core subject in the Master of Cyber Security.

 

What is included?

In addition to the weekly hour-long interactive webinars, you will be provided with audio lectures, suggested reading materials, an active discussion forum and a weekly activity to complete.

 

Is there a final exam?

Yes — the short course exam will be a timed, open-book exam that you will sit at your computer.

 

Do I get a completion certificate if I complete the course?

Yes — provided you receive a pass mark (50% or over) for the exam.

 

Will the course qualify me for university credit?

Yes — successful completion of three or more of our short courses will qualify you for one credit for an industry elective subject in our postgraduate courses. Click here for further details.

 

Are there any pre-requisites for the course?

No, you can sit this short course all by itself. But if you don’t have a background in Cyber Security or basic IT knowledge, we recommend you complete our free short course Computer Network Fundamentals beforehand.

 

Will I need to purchase any study materials to complete the course?

No — all essential materials will be supplied.

 

Will the webinars be recorded?

Yes — all webinars are recorded and you will be able to access them, and all other free course materials, by registering for the course.

 

Am I Eligible to Study
a Post Graduate Course?

Industry experience and previous studies all contribute towards your eligibility. You do not necessarily have to have an undergraduate degree to study.