Skip to main content
SHORT COURSE

Cyber Analyst Toolkit

$ 1,950.00

START DATE

07 May

MODE

Online

DURATION

32 hrs

COMMITMENT

4 weeks

Make an enquiry

Have a question?

















Meet the Expert

Wade S. Irvin

Wade S. Irvin

Wade is a qualified IT and security professional with over 20 years of experience in the industry, including a significant career in the financial sector. Specialising in enterprise IT governance, GRC and Information Security Management System (ISMS), he plays a pivotal role as the Information Security Manager ANZ at epay.

Holding a postgraduate qualification in cyber security, Wade has developed a robust skill set bolstered by advanced certifications aligned with the NIST/NICE Cyber Security Workforce Framework. In addition to these accomplishments, Wade is certified as an ISO 27001:2022 ISMS Lead Auditor by the British Standards Institution (BSI) and has earned several vendor-specific certifications in networking and security engineering from industry leaders such as Microsoft and Cisco.

Beyond his industry roles, Wade is an active member of the Australian Information Security Association (AISA). He also serves as the Cyber Security Program Facilitator and Team Lead at ITIC Systems, Education, and Research, where he mentors students and provides them with practical, hands-on experience to prepare them for successful careers in cyber security.

More Less

Cybersecurity teams face an ever-evolving threat landscape, requiring advanced skills to detect and prevent attacks. Education is essential to staying proactive and to foster a culture of security awareness.

About this course

During this course you will aquire knowledge and develop skills through a series of multi-level learning challenges that reinforce cyber-skills, including computer forensics, cyberthreat intelligence, penetration testing, vulnerability management, detection and response. These insights will assist organisations promote a culture of security awareness through proactively focusing on understanding risks, continuous monitoring and implementing robust controls. This approach ensures teams will be equipped to effectively combat emerging cyber risks and maintain a strong defence against new and persistent threats.

Key benefits of this course

This course is a practical and effective way to prepare for the challenges encountered in the field. Participants will have the opportunity to:

  • Gain hands-on experience in realistic lab environments
  • Reinforce cybersecurity knowledge through using real-world tools
  • Learn how to monitor, identify, investigate and respond to cyber threats
  • Seek and exploit vulnerabilities in a computer system
  • Acquire investigative and analytical techniques to gather and preserve digital evidence.

Digital badge and certificate

A digital badge and certificate will be awarded following the successful completion of any necessary tasks or assessments to demonstrate acquired learning of the short course or for meeting attendance and/or participation requirements.

Learn more about UTS Open digital badges.

Course outline

This course is delivered in a scheduled format over 4 weeks (32 hours of learning in total). The online workshops are led by industry experts and will be conducted weekly on Wednesday and Friday afternoons from 1pm to 5pm.

The following key areas will be covered during the course:

Forensics Analysis

Use forensic tools to gather and present evidence needed to support an intrusion case.

Tools:

  • Autopsy
  • Registry Explorer
  • DCODE
  • OphCrack
  • USB Historian

Cyberthreat intelligence

Learn how to integrate, interpret, evaluate, and analyse processed raw data to transform it into actionable intelligence.

Tools:

  • Wireshark
  • Azure Monitor
  • Microsoft Sentinel

Vulnerability Management, Detection and Response

Learn how to scan for vulnerability, identity weaknesses in the security posture and fix potential security issues.

Tools:

  • Qualys VMDR

Penetration Testing

Use Kali Linux penetration testing tools to conduct authorised simulated cyberattacks on a computer, aiming to compromise its defences and identify potential vulnerabilities.

Tools:

  • Nmap
  • Metasploit

Course learning objectives

Upon successful completion of this course, participants should be able to:

  • Identify and remediate security vulnerabilities
  • Implement security controls within an enterprise using cloud-native architecture and technologies
  • Conduct digital forensics investigation using forensic tools to research and provide the necessary evidence needed to support a case of an intrusion
  • Maintain an organisation’s security posture, and gather intelligence by employing reconnaissance, and scanning tools.  

Requirements

  • Basic knowledge of IT systems, and security concepts  
  • To participate in this online course, you will need a personal computer with adequate internet access, web conferencing capability and an operating system with a web browser compatible with Canvas, Zoom and Microsoft Teams.

Enrolment conditions

Course purchase is subject to UTS Open Terms and Conditions. 

COVID-19 response 

UTS complies with latest Government health advice. Delivery of all courses complies with the UTS response to COVID-19.

Contact us

For any questions on enrolment or payment, please email support@open.uts.edu.au 

If you have a specific question on course content or requirements, please email FEITshortcourses@uts.edu.au

Who is this course for?

This course is suitable for anyone with prior knowledge of IT systems and security concepts aiming to acquire job-ready skills and get hands-on experience to prepare for a career in cybersecurity.

Book a session

Wed 07 May 2025-
Fri 30 May 2025
Expert: Wade S. Irvin
  • Online via Zoom. Click on the underlined sessions and hours total link below to reveal specific session details.
  • Online
  • 8 sessions, 32 hours total

Enrolments close at 11.59pm Wednesday 7 May 2025 (AEST), or when all places have been filled, whichever occurs first.

Wed 16 Jul 2025-
Fri 08 Aug 2025
Expert: Wade S. Irvin
  • Online via Zoom. Click on the underlined sessions and hours total link below to reveal specific session details.
  • Online
  • 8 sessions, 32 hours total

Enrolments close at 11.59pm Wednesday 16 July 2025 (AEST,) or when all places have been filled, whichever occurs first.

Acknowledgement of Country

UTS acknowledges the Gadigal people of the Eora Nation, the Boorooberongal people of the Dharug Nation, the Bidiagal people and the Gamaygal people, upon whose ancestral lands our university stands. We would also like to pay respect to the Elders both past and present, acknowledging them as the traditional custodians of knowledge for these lands.

loading