For further information or to request a quotation, please contact the Professional Education Courses Unit on:
Enquiries Phone: 02 5114 5573
Enquiries Email: ProfEdCourses@adfa.edu.au
As cyberthreats continue to disrupt business on a daily basis, the need for security experts is at an all-time high. Yet talent is scarce.
The new Certified in Cybersecurity (CC) entry-level certification from (ISC)2, the world’s leading cybersecurity professional organisation known for the CISSP®, helps organisations like yours develop new talent for your teams and build a stronger line of defence.
No cybersecurity work experience or formal education/degree is required. CC certification prepares candidates to start their path toward cybersecurity leadership with the key foundational concepts in information security, determined by cyber experts and practitioners working in the field.
As an (ISC)2 Official Training Partner, UNSW Canberra is pleased to offer you Certified in Cybersecurity exam preparation.
We’ll dive deep into these key topics:
• Domain 1: Security Principles
• Domain 2: Business Continuity (BC), Disaster Recovery (DR), & Incident Response Concepts
• Domain 3: Access Controls Concepts
• Domain 4: Network Security
• Domain 5: Security Operations
UNSW Institute for Cyber Security is a unique, cutting-edge, interdisciplinary research and teaching centre, working to develop the next generation of cyber security experts and leaders.
The centre is based in Canberra at the Australian Defence Force Academy and provides professional, undergraduate and post graduate education in cyber security. Our air-gapped, state of the art cyber range offers a secure environment where we deliver a number of technical and highly specialised learning opportunities.
Our courses are designed to give the next generation of cyber security professionals the skill sets needed to thrive in the industry. We can also create bespoke professional education programs tailored to your organisation's needs.
Contact us at firstname.lastname@example.org to discuss how.
On completion of this course, participants should be able to:
• Discuss the foundational concepts of cybersecurity principles.
• Recognize foundational security concepts of information assurance.
• Define risk management terminology and summarize the process.
• Relate risk management to personal or professional practices.
• Classify types of security controls.
• Distinguish between policies, procedures, standards, regulations and laws.
• Demonstrate the relationship among governance elements.
• Analyze appropriate outcomes according to the canons of the (ISC)² Code of Ethics when given examples.
• Practice the terminology of and review security policies.
• Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.
• Recall the terms and components of incident response.
• Summarize the components of a business continuity plan.
• Identify the components of disaster recovery.
• Practice the terminology and review concepts of business continuity, disaster recovery and incident response.
• Select access controls that are appropriate in a given scenario.
• Relate access control concepts and processes to given scenarios.
• Compare various physical access controls.
• Describe logical access controls.
• Practice the terminology and review concepts of access controls.
• Explain the concepts of network security.
• Recognize common networking terms and models.
• Identify common protocols and port and their secure counterparts.
• Identify types of network (cyber) threats and attacks.
• Discuss common tools used to identify and prevent threats.
• Identify common data center terminology.
• Recognize common cloud service terminology.
• Identify secure network design terminology.
• Practice the terminology and review concepts of network security.
• Explain concepts of security operations.
• Discuss data handling best practices.
• Identify key concepts of logging and monitoring.
• Summarize the different types of encryption and their common uses.
• Describe the concepts of configuration management.
• Explain the application of common security policies.
• Discuss the importance of security awareness training.
• Practice the terminology and review concepts of network operations.
This course covers the following chapters and modules:
Chapter 1: Security Principles
• Module 1: Understand the Security Concepts of Information Assurance
• Module 2: Understand the Risk Management Processes
• Module 3: Understand Security Controls
• Module 4: Understand Governance Elements
• Module 5: Understand (ISC)2 Code of Ethics
Chapter 2: Incident Response, Business Continuity and Disaster Recovery
• Module 1: Understand Incident Response
• Module 2: Understand Business Continuity
• Module 3: Understand Disaster Recovery
Chapter 3: Access Controls Concepts
• Module 1: Understand Access Control Concepts
• Module 2: Understand Physical Access Controls
• Module 3: Understand Logical Access controls
Chapter 4: Network Security
• Module 1: Understand Computer Networking
• Module 2: Understand Network (Cyber) Threats and Attacks
• Module 3: Understand Network Security Infrastructure
Chapter 5: Security Operations
• Module 1: Understand Data Security
• Module 2: Understand System Hardening
• Module 3: Understand Best Practice Security Policies
• Module 4: Understand Security Awareness Training
Chapter 6: Course Summary and Test Preparation
• Module 1: Certification Requirements
• Module 2: Scheduling the Exam
• Module 3: Before the Exam
• Module 4: Day of Exam
• Module 5: Tips for Reading the Questions
• Module 6: After the Exam
Note: Course materials are organized by chapter, not domain, which may result in domains or individual domain topics being covered in a different order than what appears in the exam outline. The chapter structure allows us to properly cover the exam domains while supporting a more cohesive learning experience.
This course maps to the following NICE Framework KSAs (Knowledge, Skills & Abilities):
K0002: Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
K0179: Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
K0612: Knowledge of what constitutes a “threat” to a network.
S0034: Skill in discerning the protection needs (i.e., security controls) of information systems and networks.
A0077: Ability to coordinate cyber operations with other organisation functions or support activities.
A0123: Ability to apply cybersecurity and privacy principles to organisational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
The National Initiative for Cybersecurity Education (NICE) Cyber Security Workforce Framework developed by the National Institute of Standards and Technology (NIST) establishes a taxonomy and common lexicon that describes cyber security work and job roles.
To find out more about the NICE Framework, go to: niccs.us-cert.gov/workforce-development/cyber-security-workforce-framework
Courses will be held subject to sufficient registrations. UNSW Canberra reserves the right to cancel a course up to five working days prior to commencement of the course. If a course is cancelled, you will have the opportunity to transfer your registration or be issued a full refund. If registrant cancels within 10 days of course commencement, a 50% registration fee will apply. UNSW Canberra is a registered ACT provider under ESOS Act 2000-CRICOS provider Code 00098G.