Skip to main content
SHORT COURSE

Cyber Analyst Toolkit

$ 1,950.00

START DATE

07 May

MODE

Online

DURATION

32 hrs

COMMITMENT

4 weeks

Make an enquiry

Have a question?

















Meet the Expert

Wade S. Irvin

Wade S. Irvin

Wade is a qualified Information Technology and Security professional with diverse experience in governance of enterprise IT, Information security management systems (ISMS), compliance and risk management. 

He has his postgraduate qualification in cybersecurity from CSU and multiple certificates in cyber security management curriculum to the NIST/NICE Cybersecurity Workforce Framework with area of specialty in security operations (CCSOM | Certified Cybersecurity Operations Manager), incident response (CCIRM | Certified Cybersecurity Incident Response Manager), and disaster recovery (CDRRM | Certified Disaster Recover and Response Manager).

Wade has also achieved ISO 27001:2022 ISMS Lead Auditor certificate from the British Standards Institution (BSI) and several vendor-specific certifications awarded by Microsoft, Cisco, etc. He is member of the Australian Information Security Association (AISA), IT Operations Manager of epay ANZ, and Cybersecurity team lead at ITIC.

More Less

Cybersecurity teams face an ever-evolving threat landscape, requiring advanced skills to detect and prevent attacks. Education is essential to staying proactive, focusing on understanding risks, implementing robust controls, continuous monitoring, and fostering a culture of security awareness. This approach ensures teams can effectively combat emerging cyber risks and maintain a strong defence against new and persistent threats.

About this course

In this course you develop skills in a series of multilevel learning challenges that reinforce cyber skills including computer forensics, cyberthreat intelligence, penetration testing, vulnerability management, detection and response.

Key benefits of this course

This course is a practical and effective way to prepare for the challenges that learners will encounter in the field. They will have the opportunity to:

  • Gain hands-on experience in realistic lab environments
  • Reinforce cybersecurity knowledge by using real-world tools
  • Learn how to monitor, identify, investigate, and respond to cyber threats
  • Attempt to find and exploit vulnerabilities in a computer system
  • Acquire investigation and analysis techniques to gather and preserve digital evidence.

Course outline

This course is delivered in a scheduled format over 4 weeks (32 hours of learning in total). The online workshops are led by industry experts and will be conducted weekly on Wednesday and Friday afternoons from 1pm to 5pm.

The following key areas will be covered during the course:

Forensics Analysis

Use forensic tools to gather and present evidence needed to support an intrusion case.

Tools:

  • Autopsy
  • Registry Explorer
  • DCODE
  • OphCrack
  • USB Historian

Cyberthreat intelligence

Learn how to integrate, interpret, evaluate, and analyse processed raw data to transform it into actionable intelligence.

Tools:

  • Wireshark
  • Azure Monitor
  • Microsoft Sentinel

Vulnerability Management, Detection and Response

Learn how to scan for vulnerability, identity weaknesses in the security posture and fix potential security issues.

Tools:

  • Qualys VMDR

Penetration Testing

Use Kali Linux penetration testing tools to conduct authorised simulated cyberattacks on a computer, aiming to compromise its defences and identify potential vulnerabilities.

Tools:

  • Nmap
  • Metasploit

Course learning objectives

On successful completion of this course, participants will have demonstrated the knowledge and skills to:

  • Identify and remediate security vulnerabilities
  • Implement security controls within an enterprise using cloud-native architecture and technologies
  • Conduct digital forensics investigation using forensic tools to research and provide the necessary evidence needed to support a case of an intrusion
  • Maintain an organisation’s security posture, and gather intelligence by employing reconnaissance, and scanning tools.  

Requirements

Basic knowledge of IT systems, and security concepts.  

To participate in this online course, you will need a personal computer with adequate internet access, web conferencing capability and an operating system with a web browser compatible with Canvas, Zoom and Microsoft Teams.

Enrolment conditions

Course purchase is subject to UTS Open Terms and Conditions. 

COVID-19 response 

UTS complies with latest Government health advice. Delivery of all courses complies with the UTS response to COVID-19.

Contact us

For any questions on enrolment or payment, please email support@open.uts.edu.au 

If you have a specific question on course content or requirements, please email FEITshortcourses@uts.edu.au

Who is this course for?

This course is suitable for people with prior knowledge of IT systems, and security concepts, aiming to acquire job-ready skills and get hands-on experience to prepare for a career in cybersecurity.

Book a session

Wed 07 May 2025-
Fri 30 May 2025
Expert: Wade S. Irvin
  • Online via Zoom. Click on the underlined sessions and hours total link below to reveal specific session details.
  • Online
  • 8 sessions, 32 hours total

Enrolments close at 11.59pm Wednesday 7 May 2025 (AEST), or when all places have been filled, whichever occurs first.

Wed 16 Jul 2025-
Fri 08 Aug 2025
Expert: Wade S. Irvin
  • Online via Zoom. Click on the underlined sessions and hours total link below to reveal specific session details.
  • Online
  • 8 sessions, 32 hours total

Enrolments close at 11.59pm Wednesday 16 July 2025 (AEST,) or when all places have been filled, whichever occurs first.

Acknowledgement of Country

UTS acknowledges the Gadigal people of the Eora Nation, the Boorooberongal people of the Dharug Nation, the Bidiagal people and the Gamaygal people, upon whose ancestral lands our university stands. We would also like to pay respect to the Elders both past and present, acknowledging them as the traditional custodians of knowledge for these lands.

loading