ϳԹ

Skip navigation

Behind the Breach: Understanding Cyber Threats

Be trained by academic and industry experts.

Course information

Dates and times 18, 19 and 20 September
4 pm - 8 pm or
19, 20 and 21 November
4 pm - 8 pm
Cost Full price - $1,800 + Humanitix Booking Fee (excl. GST)
Early bird* - $1,650 + BF
Location
Commitment 12 hours face to face and 10 hours (approx.) pre course material
Registrations close September intake;
6 Sep 2024
November intake;
8 Nov 2024
(Unless sold-out prior)

About the short course

With a cybercrime reported every six minutes and ransomware costing billions annually, Australia is facing an unprecedented cyber security crisis in need of immediate action (Department of Home Affairs, 2023).

The University of Canberra (ϳԹ), in partnership with Cisco Networking Academy, Canberra Institute of Technology (CIT), and trusted industry leaders, offers Behind the Breach: Understanding Cyber Threats.

This short course empowers non-ICT individuals with essential cyber security skills, including a foundational understanding of cyber security risk management, recognising cyber threats and understanding pathways into cyber security careers.

Over three days, participants will hear from academic and industry experts with in-depth knowledge and experience working in the sector. Applying your learning to real world scenarios, you’ll gain skills to help you personally and professionally. Upon completion you'll receive a ϳԹ Certificate of Completion, and up to three optional recognised Cisco badges with support via optional online drop in sessions and learning modules**.

*Early bird rate for September short course closes 22 August 2024 and the early bird rate for November short course closes 1 October 2024.

**Cisco Networking Academy courses include Introduction to Cybersecurity (Beginner), Cybersecurity Essentials (Intermediate) & Cyber Threat Management (Intermediate). Pre learning for the Short Course is estimated to take 10hours.

Who this course is for

  • Those who have limited to no cyber security training but might work within the ICT industry.
  • People not currently working in ICT seeking to retrain and enhance their skills.
  • Those interested in protecting themselves online.
  • Those who may currently be in an IT intensive role at an organisation that does not have a large IT department with cyber experts (eg: web administrators and ICT support officers).

Learning outcomes

After successful completion of this course, students will be able to:

  • Recognise the most common cyber security threats, attacks and vulnerabilities.
  • Execute basic cyber security risk management procedures.
  • Apply first order security principals when developing policies and procedures compliant with modern frameworks and governance practices.
  • Support the implementation of security controls for networks, servers and applications, protecting data confidentiality, integrity, and availability.

Learn from industry experts

Adam Rice

Cisco

Adam is an experienced and knowledgeable cyber security professional who can offer specialised insights and guidance on security-related issues, helping identify potential threats, assess risk, and provide recommendations on how to mitigate security risks. Adam can help organisations develop a cyber strategy that aligns with their business goals and objectives.

Adam comes to Cisco after stints as the CISO at Rio Tinto, VP & CISO at Hilton Worldwide, VP & CSO at Cubic Corporation, CISO at ATK, and VP & CSO at Tata Communications. He has thirty years of IT experience, as both a consultant and Senior cyber executive. He has experience in mining, hospitality, high technology, the defense industrial base, Manage Security Services, and telecommunications. Adam holds a master’s degree in public administration from George Mason University, as well as post graduate work in Information Security Management from the University of Virginia. Adam has published numerous articles on information security.

Rob Morretti

IPTel Solutions

Rob is based in Melbourne and joined IPTel Solutions in May this year as a “Technical Pre-Sales Consultant”. His role prior to this was as a Systems Engineer at Cisco focusing on Enterprise Networks. Rob has worked in Technology all his career, including various fields within the Electronics industry, to IT as a System Administrator and Domain Administrator, and the last few years in the Network Engineering industry focusing in technical pre-sales. Robert has a genuine enthusiasm for Technology and understands the value that technology can bring to organisations of all sizes.

Prof. Frank Den Hartog

University of Canberra

Cisco Research Chair - Critical Infrastructure, University of Canberra.

A long track record in industry as well as academia with a focus on the cyber security of critical infrastructures such as telecommunication networks and Industry IoT. Based at Innovation Central Canberra, his current research topics include:
  • Zero Trust Architectures
  • Physical Layer Security
  • Programmable Networks
  • Secure Industry 4.0
  • Cyber-physical systems

Matt Carling

Cisco

Matt is a National Cybersecurity Advisor for Australia within the Trust Office of Cisco’s Security and Trust Organisation (STO). The STO core missions include protecting Cisco from cyber threat, protecting Cisco products through Cisco’s Trustworthy Systems program, and helping protect Cisco customers. Matt is focused on enabling a broad range of initiatives under these missions including sharing Cisco’s own cyber security experiences and practices with customers. Matt has held various roles over the last 24 years at Cisco across the services, sales, and engineering organisations covering service provider, enterprise, public sector, and national security and defence domains.

Matt holds a Bachelor of Engineering degree in Computer Engineering (University of Canberra), Graduate Diploma in Management Sciences (University of Canberra), and a Graduate Certificate in Cybersecurity (Charles Sturt University). Matt is also CISSP and CIPP/E certified.

Belinda Paterson

Belinda is an accomplished Senior Consultant with extensive experience in the cybersecurity domain. Her career has been marked by a commitment to driving excellence in cyber risk management, governance, and assurance across diverse organisations. Her expertise lies in designing and implementing robust cybersecurity frameworks, leading teams, and collaborating with stakeholders to ensure the highest standards of security.

Matt Salier

Australian Cyber Collaboration Centre (Aus3C)

Matthew is the CEO of the Australian Cyber Collaboration Centre (Aus3C), a member-based not-for-profit organisation dedicated to securing Australia's digital future. Under his leadership, Aus3C engages with individuals and small to medium businesses to enhance their cyber resilience and confidence. The organisation also collaborates with large enterprises and critical infrastructure providers to develop robust cybersecurity capabilities. By leveraging connections with national, regional and international partners, Aus3C integrates best practices into the Australian cybersecurity ecosystem; ensuring comprehensive protection and innovation.

Daniel Gutierrez

Daniel is a seasoned cybersecurity expert and educator with a robust background in network security, software development, and IT infrastructure. He has extensive experience teaching Essential 8 and other advanced cybersecurity courses, equipping students with the skills needed to protect digital environments from emerging threats. Daniel's expertise includes network design, firewall implementation, intrusion detection systems, and cloud security. He has also served as a Cisco Instructor, specialising in networking and cybersecurity, where he has successfully guided students through complex security protocols and industry best practices. Daniel is dedicated to fostering the next generation of cybersecurity professionals, combining hands-on experience with theoretical knowledge to prepare his students for the challenges of the digital age.

Course structure

Day 1

  • The basics: the role of trust in cyber security
  • Key definitions and tools
  • Cyber security as a business decision
  • Business protection & developing compliant policies for business

Day 2

  • Cyber security threats, vulnerabilities, and attacks
  • Threat intelligence & threat management in enterprise networks

Day 3

  • Governance Risk and Compliance and its role in protecting and limiting breach efforts
  • Risk Management and Security Controls
certificate

After completion

Once you’ve completed the Behind the Breach: Understanding Cyber Threats short course, you will earn a certificate of completion from University of Canberra, a Cisco Networking Academy digital badge for “Intro to Cyber Security”, plus the option to receive post course support to complete two additional badges for Cybersecurity Essentials & Cyber Threat Management.

Proudly supported by

certificate

If you would like to know more about this short course, please contact us to have all your questions answered.

Contact us

Other quick links