Set the focus and attention on cyber security and security issues.

This training is built to provide an in-depth user education focused towards areas of responsibility to help protect the inforamtion and information assets.This Instructor-led Training course will allow your staff to recognise IT Security concerns and issues and respond accordingly.

Length 1 day
Delivery Options In-house training
Classroom training
Virtual (Online)
Target Audience Employees
Management executives
Business Managers
Course Schedule
Available Australia-wide

(Sydney, Melbourne, Brisbane, Adelaide..)


About this course

The aim of the course is to promote cyber security awareness, establish accountability and keep students informed on the latest security issues. The course provides fun, interactive and intriguing content to allow users to learn the skills and knowledge in order to improve job performance. 

The course is a pre-requisite for further courses and sets the base for students to progress in the Cyber Security Learning continuum to acquire the knowledge and skills of Security Essentials and Role-Based Security training programs. 

Audience profile

The target audience of this course are Employees, Executive Management and Business Managers.

Learning outcomes

At the end of this course, yous should be able to:

-Identify suspicious emails, phishing attacks, spam and malware attacks,
-Identify web-borne threats such as cross-site scripting and safe downloads etc,
-Describe the roles and responsibilities in relation to privacy and confidentiality of sensitive data,
-Identify the legal obligations of the organisations in relation to privacy and confidentiality of sensitive data,
-Describe the significance of digital identity and password management,
-Identify the types of authentication methods and characteristics of healthy passwords,
-Outline the consequences of malware threats and attacks,
-Identify the best-practice protection methods and actions against malware threats and attacks,
-Identify malicious applications, networks, threats and attacks present on common mobile devices such as smartphones, tablets, and personal computers,
-Outline organisational obligations in relation to cyber security compliance with state and government regulations,
-Define social engineering and use examples to identify the methods used in social engineering attacks ,
-Outline the importance of reporting security incidents identified above to Cyber Security managers.


Module 1: Email Security
Module 2: Web Security
Module 3: Privacy & Confidentiality Awareness
Module 4: Password Security
Module 5: Malware Protection
Module 6: Mobile Device Security
Module 7: Compliance Awareness
Module 8: Social Engineering


Not applicable.