Key benefits of this course
This course is a practical and effective way to prepare for the challenges that learners will encounter in the field. They will have the opportunity to:
- Gain hands-on experience in realistic lab environments
- Reinforce cybersecurity knowledge by using real-world tools
- Learn how to monitor, identify, investigate, and respond to cyber threats
- Attempt to find and exploit vulnerabilities in a computer system
- Acquire investigation and analysis techniques to gather and preserve digital evidence.
Course outline
This course is delivered in a scheduled format over 4 weeks (32 hours of learning in total). The online workshops are led by industry experts and will be conducted weekly on Wednesday and Friday afternoons from 1pm to 5pm.
The following key areas will be covered during the course:
Forensics Analysis
Use forensic tools to gather and present evidence needed to support an intrusion case.
Tools:
- Autopsy
- Registry Explorer
- DCODE
- OphCrack
- USB Historian
Cyberthreat intelligence
Learn how to integrate, interpret, evaluate, and analyse processed raw data to transform it into actionable intelligence.
Tools:
- Wireshark
- Azure Monitor
- Microsoft Sentinel
Vulnerability Management, Detection and Response
Learn how to scan for vulnerability, identity weaknesses in the security posture and fix potential security issues.
Tools:
Penetration Testing
Use Kali Linux penetration testing tools to conduct authorised simulated cyberattacks on a computer, aiming to compromise its defences and identify potential vulnerabilities.
Tools:
Course learning objectives
On successful completion of this course, participants will have demonstrated the knowledge and skills to:
- Identify and remediate security vulnerabilities
- Implement security controls within an enterprise using cloud-native architecture and technologies
- Conduct digital forensics investigation using forensic tools to research and provide the necessary evidence needed to support a case of an intrusion
- Maintain an organisation’s security posture, and gather intelligence by employing reconnaissance, and scanning tools.
Requirements
Basic knowledge of IT systems, and security concepts.
To participate in this online course, you will need a personal computer with adequate internet access, web conferencing capability and an operating system with a web browser compatible with Canvas, Zoom and Microsoft Teams.
Enrolment conditions
Course purchase is subject to UTS Open Terms and Conditions.
COVID-19 response
UTS complies with latest Government health advice. Delivery of all courses complies with the UTS response to COVID-19.
Contact us
For any questions on enrolment or payment, please email support@open.uts.edu.au
If you have a specific question on course content or requirements, please email FEITshortcourses@uts.edu.au