Qualification Details

Introduction to Cyber Security Skill Set

AE382
Normally $950
FREE for eligible participants
Check your eligibility further below.
Course Overview

This Cyber Security course is an initiative of the WA State Government in conjunction with the Department of Training and Workforce Development (DTWD). It is a funded training course designed to teach knowledge and hand on skills associated with working online both at a personal and workplace level.

The statistics
  • 300,000 cybercrimes are committed in Australia every year, an increase of over 600%, only 150 of those crimes were prosecuted in 2021.
  • 43% of Cyber-attacks in Australia are aimed at small business which accounts for a $381 million in losses per year.
  • Over 78% of organisations saw an email-based ransomware attack in 2021 resulting in irretrievable loss of data, an increase of nearly 500% since the start of the pandemic.
This short subsidised course is your introduction to the concepts of Cyber Attack prevention

It is ideal for anyone who is interested in the following:
  • protecting yourself from data or identity theft and de-risking financial loss
  • training your staff to be cyber aware in the workplace
  • starting your career as a cyber security professional
This course is your starting point in your career as a Network Engineer or Cyber Security Specialist.
Course Schedule

3 options:

  • Full time – Five days Monday to Friday
  • Part time (Day) – One day per month for 5 months
  • Part time (Evenings) – 2 nights per week for 5 weeks   
Course content

These three units can form part of a full qualification in Cyber Security

Part 1 – Protect your personal information and online profile

BSBXCS301 Protect own personal online profile from cyber security

In this part of the course the student will learn to Identify existing and potential security threats to their own personal online profile by understanding how to do the following:

  1. Determine where all their current online accounts and profiles are located
  2. How to identify common threats to the security of their online profiles
  3. Securely backup and restore data

Part 2 – Working Cyber Smart in the workplace

BSBXCS302 Identify and report online security threats

In this part of the course the student will learn the skills and knowledge required to identify and report online security threats to limit potential impact of cyber security breaches in the workplace by understanding the following:

  1. Follow internal policies, procedures and plans relating to potential online security breaches
  2. Learn how to identify features of common types of potentially fraudulent communications including but not limited to:
  • Common types of online scams and security risks, including phishing scams
  • Common techniques of phishing and spear phishing used by attackers, including:
  • spam email and SMS text
  • social engineering, including telephone calls, social media and website requests for information
  1. Learn how to implement techniques to verify suspicious requests for information including indicators of insecure connection to websites, in particular where data is being collected.

Part 3 – Identify online security threats and implement actions to secure and protect data including disaster recovery methods

BSBXCS303 Securely manage personally identifiable information and workplace information

In this part of the course the student will learn how to handle Personally Identifiable Information (PII) and workplace information responsibly by understanding and demonstrating the following:

  1. Implement practices and procedures relating to workplace information including the requirements relating to securely managing PII and workplace information
  2. Identify and manage sensitive data in your workplace environment including:
  • identifying sensitive data
  • securely storing, sharing and managing customer information
  • encryption, and protocols for its uses
  • data classification
  • media and document labelling
  • monitoring and reporting faults and malfunctions in IT infrastructure
  1. Apply privacy policies to all data devices incorporating Industry best practice including but not limited to:
  • password protection
  • storage locations
  • securely sharing
  • data deletion
Course Eligibility

Eligibility Criteria for fee free training

  • Are you aged between 15-24 years and not enrolled in secondary school?
  • Are you receiving Jobseeker or Job Keeper?
  • Are you receiving or a dependent of a person receiving Youth Allowance, AUSTUDY or ABSTUDY?
  • Do you hold, or are you a dependent of a person who holds:
    • a Pensioner Concession Card or Health Care Card; or
    • a Repatriation Health Benefits Card issued by the Department of Veterans’ Affairs?
  • Are you a dependent of a person/s who are inmate/s of a custodial institution?

If you answered yes to any of the above eligibility requirements, you will be eligible for fee-free training.

If you did not answer yes, you may still be eligible to a subsidised rate of $137.70.

Ask your training advisor to check your suitability

Course Fees

Heavily subsidised through WA Government funding, see eligibility criteria and fee table below:

Fee Type Amount
Normal Cost $950
Eligible for free training (Govt Subsidised) No charge
Eligible for subsidised training (Govt Subsidised) $137.70

Conditions apply, please contact us for more information.
The Student tuition fees are indicative only and are subject to change given individual circumstances at enrolment. Additional fees may apply such as Student service and resource fees.

For more information view the brochure below, or visit the course page to book a place.

Call us on 1300 371 130 if you have any questions.


*TYPEFORM*

Upcoming Programs

There are currently no dates available for this course.