ϳԹ

Skip navigation

Behind the Breach: Understanding Cyber Threats

Be trained by academic and industry experts.

Course information

Dates and times 19, 20 and 21 November
4 pm - 8 pm
Cost Full price - $1,800 + Humanitix Booking Fee (excl. GST)
Early bird* - $1,650 + BF
Location
Commitment 12 hours face to face and 10 hours (approx.) pre course material
Registrations close November intake;
8 Nov 2024
(Unless sold-out prior)

About the short course

With a cybercrime reported every six minutes and ransomware costing billions annually, Australia is facing an unprecedented cyber security crisis in need of immediate action (Department of Home Affairs, 2023).

The University of Canberra (ϳԹ), in partnership with Cisco Networking Academy, Canberra Institute of Technology (CIT), and trusted industry leaders, offers Behind the Breach: Understanding Cyber Threats.

This short course empowers non-ICT individuals with essential cyber security skills, including a foundational understanding of cyber security risk management, recognising cyber threats and understanding pathways into cyber security careers.

Over three days, participants will hear from academic and industry experts with in-depth knowledge and experience working in the sector. Applying your learning to real world scenarios, you’ll gain skills to help you personally and professionally. Upon completion you'll receive a ϳԹ Certificate of Completion, and up to three optional recognised Cisco badges with support via optional online drop in sessions and learning modules**.

*Early bird rate for November short course closes 1 October 2024.

**Cisco Networking Academy courses include Introduction to Cybersecurity (Beginner), Cybersecurity Essentials (Intermediate) & Cyber Threat Management (Intermediate). Pre learning for the Short Course is estimated to take 10hours.

Who this course is for

  • Those who have limited to no cyber security training but might work within the ICT industry.
  • People not currently working in ICT seeking to retrain and enhance their skills.
  • Those interested in protecting themselves online.
  • Those who may currently be in an IT intensive role at an organisation that does not have a large IT department with cyber experts (eg: web administrators and ICT support officers).

Learning outcomes

After successful completion of this course, students will be able to:

  • Recognise the most common cyber security threats, attacks and vulnerabilities.
  • Execute basic cyber security risk management procedures.
  • Apply first order security principals when developing policies and procedures compliant with modern frameworks and governance practices.
  • Support the implementation of security controls for networks, servers and applications, protecting data confidentiality, integrity, and availability.

Learn from industry experts

Rama Vadlamudi

Splunk

Rama Vadlamudi is a technologist and cybersecurity expert with over two decades of experience in IT and cybersecurity. Having worked with large systems integrators and vendor technologies, Rama has collaborated extensively with state and federal government agencies, including the Department of Defence. His expertise covers complex network deployments, cloud, security, and infrastructure, with a strong history in scalable data centre architectures, security frameworks, and AI-driven cybersecurity.

Rama's academic credentials include a Master of Engineering in Telecommunications, a Bachelor of Engineering in Computer Science, and a Postgraduate Program in AI & ML. As a technology enthusiast, he is eager to share his experiences with both the challenges and opportunities presented by these advancements.

Rob Morretti

IPTel Solutions

Rob is based in Melbourne and joined IPTel Solutions in May this year as a “Technical Pre-Sales Consultant”. His role prior to this was as a Systems Engineer at Cisco focusing on Enterprise Networks. Rob has worked in Technology all his career, including various fields within the Electronics industry, to IT as a System Administrator and Domain Administrator, and the last few years in the Network Engineering industry focusing in technical pre-sales. Robert has a genuine enthusiasm for Technology and understands the value that technology can bring to organisations of all sizes.

Prof. Frank Den Hartog

University of Canberra

Cisco Research Chair - Critical Infrastructure, University of Canberra.

A long track record in industry as well as academia with a focus on the cyber security of critical infrastructures such as telecommunication networks and Industry IoT. Based at Innovation Central Canberra, his current research topics include:
  • Zero Trust Architectures
  • Physical Layer Security
  • Programmable Networks
  • Secure Industry 4.0
  • Cyber-physical systems

Matt Carling

Cisco

Matt is a National Cybersecurity Advisor for Australia within the Trust Office of Cisco’s Security and Trust Organisation (STO). The STO core missions include protecting Cisco from cyber threat, protecting Cisco products through Cisco’s Trustworthy Systems program, and helping protect Cisco customers. Matt is focused on enabling a broad range of initiatives under these missions including sharing Cisco’s own cyber security experiences and practices with customers. Matt has held various roles over the last 24 years at Cisco across the services, sales, and engineering organisations covering service provider, enterprise, public sector, and national security and defence domains.

Matt holds a Bachelor of Engineering degree in Computer Engineering (University of Canberra), Graduate Diploma in Management Sciences (University of Canberra), and a Graduate Certificate in Cybersecurity (Charles Sturt University). Matt is also CISSP and CIPP/E certified.

Belinda Paterson

Belinda is an accomplished Senior Consultant with extensive experience in the cybersecurity domain. Her career has been marked by a commitment to driving excellence in cyber risk management, governance, and assurance across diverse organisations. Her expertise lies in designing and implementing robust cybersecurity frameworks, leading teams, and collaborating with stakeholders to ensure the highest standards of security.

John Cirocco

Australian Cyber Collaboration Centre (Aus3C)

John Cirocco is an Australian Cyber Collaboration Centre (Aus3C) Cyber Coach with an extensive career building telecommunications systems for the Space, Defence, Enterprise, and Government sectors.

As a communicator, John has performed key roles in Aus3C programs, including cyber clinics, workshops, and events specifically focused on helping small businesses navigate the complexities of cybersecurity. These programs have included: Cyber Uplift Step Program, Cyber Smart training (AICSA), Gig City Cyber program, and Cyber Clinics.

Daniel Gutierrez

Daniel is a seasoned cybersecurity expert and educator with a robust background in network security, software development, and IT infrastructure. He has extensive experience teaching Essential 8 and other advanced cybersecurity courses, equipping students with the skills needed to protect digital environments from emerging threats. Daniel's expertise includes network design, firewall implementation, intrusion detection systems, and cloud security. He has also served as a Cisco Instructor, specialising in networking and cybersecurity, where he has successfully guided students through complex security protocols and industry best practices. Daniel is dedicated to fostering the next generation of cybersecurity professionals, combining hands-on experience with theoretical knowledge to prepare his students for the challenges of the digital age.

Course structure

Day 1

  • The basics: the role of trust in cyber security
  • Key definitions and tools
  • Cyber security as a business decision
  • Business protection & developing compliant policies for business

Day 2

  • Cyber security threats, vulnerabilities, and attacks
  • Threat intelligence & threat management in enterprise networks

Day 3

  • Governance Risk and Compliance and its role in protecting and limiting breach efforts
  • Risk Management and Security Controls
certificate

After completion

Once you’ve completed the Behind the Breach: Understanding Cyber Threats short course, you will earn a certificate of completion from University of Canberra, a Cisco Networking Academy digital badge for “Intro to Cyber Security”, plus the option to receive post course support to complete two additional badges for Cybersecurity Essentials & Cyber Threat Management.

Proudly supported by

certificate

If you would like to know more about this short course, please contact us to have all your questions answered.

Contact us

Other quick links