If you have an interest in working in the information technology industry, our cyber security course will help you develop the skills and knowledge for a successful career as a cyber security paraprofessional.
As a cyber security paraprofessional you'll:
In our cyber security course, you'll gain practical skills in:
We developed our cyber security course in conjunction with a significant industry advisory panel comprised of cyber security specialists in the security, banking, information technology and telecommunications industries.
|Like Box Hill Institute - IT & Cyber Security on Facebook|
|Follow Box Hill Institute - IT & Cyber Security on Instagram|
17 Jan 2020 at 01:00PM AEST
Full time: 12 months
After successful completion of our our cyber security course, you can apply for a range of employment opportunities such as being a:
International students must have completed an Australian Year 11 or international equivalent with a pass.
Current Working with Children and Police Checks if you undertake a work placement in this field.
PLEASE NOTE: Box Hill Institute only accept enrolments from international students who are 18 years of age or above at the time of course commencement.
A minimum IELTS overall score of 5.5 (Academic). A minimum TOEFL score of 530 for paper examination; 179 for computer based and 71 for internet based, or approved equivalent.
For other accepted tests, please visit the English Language Requirements page.
Successful completion of our cyber security course enables you to continue your studies in the Advanced Diploma of Cyber Security or in a diploma, advanced diploma or degree in information technology or security
This course is government accredited and has national recognition
The qualification is aligned with the Australian Qualification Framework (AQF) level 4
|Annual Tuition Fee||$10,500|
|Annual Service Fee||$160|
|Annual Material Fee||$220|
|Retain Course Items (Year 1)||$0|
|Estimated Annual Fee||$10,880|
You need to complete 10 core units and 6 elective units to gain this qualification
This unit describes a participants skills and knowledge required to communicate effectively in the workplace within the Information Technology and Cyber Security industry. This includes communicating verbally, communicating in written form, participating in meetings, making presentations, and participating in internal negotiations.
This unit provides introductory knowledge and skills to recognize threats, risks and vulnerabilities to cyber security in an organisation. It includes the threats an organisation encompasses such as networks, machines, applications, data, users and infrastructure. The unit also covers an introduction to common cyber security attack mechanisms and an introduction to identity and threat management as well as security issues surrounding Internet of Things (IOT) devices. Finally, the unit introduces the implementation of tools and systems an organisation can use to protect from cyber-attacks.
This unit provides a cyber security practitioner with an introduction to the skills and knowledge required to comprehend how data travels around the internet and the function and operation of protocols such as the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and devices that facilitate this data transfer.
This unit provides introductory skills and knowledge required to implement testing procedures for systems in an organisation. These involve application layer testing tools as defined by the Open Web Application Security Project (OWASP), network testing and monitoring tools. The unit examines common threats, ethical hacking principles and introduction to penetration testing, social engineering security issues, enumeration, port scanning, sniffers, footprinting, traffic sniffers and wireless LAN vulnerabilities and contains a solid treatment of intrusions.
This unit provides a sound working knowledge of the key features which make up the network security for an organisation. The unit includes a detailed investigation of threats and mitigation techniques, network security architectures, introduction to firewall setup and configuration, intrusion prevention system (IPS) setup and operation as well as internetworking operating system (IOS) software features to harden routers and switches. The unit also investigates proxy server vulnerabilities, Wireless Lan (WLAN) security vulnerabilities and the application of Virtual Private Networks (VPN’s) and cryptography fundamentals.
Prerequisites: VU21988 - Utilise basic network concepts and protocols required in cyber security VU21990 – Recognise the need for cyber security in an organisation
The purpose of this unit is to undertake a project that simulates a real cyber security environment. The project may include using a Cyber Security Operations Centre (CSOC) sandbox or equivalent laboratory environment. This environment allows the participant to demonstrate configuring and testing of firewalls, implementing Intrusion Detection System (IDS) and evaluating and identifying any traffic anomalies. The use of Red & Blue teaming exercises to identify security breaches and apply mitigation strategies to minimise further risk should be included as part of the exercise
Prerequisites: ICTPRG407 - Write scripts for software applications VU21988 - Utilise basic network concepts and protocols required in cyber security VU21989 – Test concepts and procedures for cyber security VU21990 – Recognise the need for cyber security in an organisation
This unit provides base level skills and knowledge to configure an operating system on a personal computer, adding security, setting user level passwords and privileges to limit and identify user access – all required to increase protection of the end point from cyber security attacks. The unit also provides an overview of internet of things (IOT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.
This unit provides the knowledge and skills necessary for a cyber security practitioner to detect and recognize discrepancies in data by performing analysis. The unit covers the collection of data on a scenario and performing basic analysis and includes the process of breaking down the scenario to a set of subtasks which are examined for their effectiveness. The unit includes an introduction of databases as a repository for data and the vulnerabilities that exist and an introduction to software tools to supporting pattern recognition.
The unit provides the basic knowledge and skills required to manage the implementation of the security infrastructure for an organisation. It includes assessing risk, implementing appropriate controls, monitoring their effectiveness, following organisation policy to store relevant data and compiled reports for future audit purposes. The practitioner will monitor and evaluate the physical security infrastructure of the organisation, and implement a regular security infrastructure maintenance program.
This unit provides the basic knowledge and skills for a cyber security practitioner to examine, as part of a team, an organisation’s existing incident response plan (IRP) and expand it as necessary to more thoroughly deal with incidents. The unit includes forming the team, clarifying roles, interpreting an incident response plan (IRP), using red and blue teams to test the IRP, implementing an incident, evaluating the IRP for its effectiveness and developing improvement.
This unit provides the knowledge and skills required to ensure and maintain the security of an organisation’s website by utilizing the outcomes of the Open Web Application Security Project (OWASP). Current penetration testing tools are also utilised to determine the vulnerabilities of a web site. Vulnerabilities are assessed and reported to appropriate personnel to minimize risk.
This unit describes the skills and knowledge required to write scripts to automate solutions, by using basic scripting processes, and application-specific scripting options.
It applies to individuals who may work in information and communications technology (ICT) support roles and who are required to automate tasks.
Is this the course for you?
Enrol now or enquire about this course.