Skip to main content
SHORT COURSE

Practical Data Security

$ 100.00

START DATE

Start anytime

MODE

Online

DURATION

2 hrs

COMMITMENT

2 hrs

Make an enquiry

Have a question?

















Meet the Experts

Professor Justin Lipman

Professor Justin Lipman
Professor of Cybersecurity and Director of the UTS Cyber Digital Centre

Justin is Professor and Director of the Cyber Digital Centre at UTS, where he leads research and education in cybersecurity, secure connected systems and critical digital infrastructure. With over 12 years of R&D leadership at Intel and Alcatel, he brings deep industry insight to his academic roles and his research areas span cybersecurity, IoT, software-defined networking, RF systems and digital agriculture.

Justin actively supervises HDR students and develops cybersecurity teaching that bridges foundational concepts with real-world applications. A recognised innovator with 24 US patents and 130+ peer-reviewed publications, he champions standards development and industry partnerships that traverse research, impacting and strengthening Australia’s cybersecurity capability across sectors. He is an IEEE Senior Member ’12 who has secured over $35M in competitive funds.

More Less

Dr Imran Makhdoom

Dr Imran Makhdoom
Cybersecurity Research Fellow - Cyber Digital Centre, UTS

Imran is a Cybersecurity Research Fellow within the Cyber Digital Centre at UTS, where his work focuses on data security, privacy, blockchain, device integrity, secure multi-party computation and IoT. Since 2021, he has contributed to both research and teaching, delivering subjects such as Software Defined Networking and Introduction to Cybersecurity at UTS, as well as Python and Cryptography at TAFE NSW.

A former project manager in wireless communications and cybersecurity auditing, Imran holds certifications from EC-Council and the University of California, Irvine. He is a Senior Member of IEEE,  ranked among the world’s top 2% of research scientists (2023–2024). Accolades include a President’s Gold Medal from NUST, multiple research awards from UTS and a first-place win at Macquarie University’s Blockchain Hackathon.

More Less

Now more than ever, secure data handling is an essential skill. By introducing the core principles of data literacy, cybersecurity and safe information handling, this course will help you to classify and manage sensitive information, meet legal requirements and respond confidently to data breaches. From data creation to storage and everything in between, you’ll gain the skills to share the right data with the right people at the right time.

About this course

In today’s connected world, organisations of all sizes handle sensitive data, including donor records, client information and operational files. This course will equip you with the skills and knowledge needed to protect that data effectively.

You'll examine real-world examples of data breaches, learn how to identify risks, and apply key frameworks such as the LOCK framework and Defence in Depth. Whether you're managing community programs, coordinating digital campaigns, or supporting internal operations, you'll gain practical strategies for classifying, sharing, storing and securing information.

You'll also build confidence in responding to cyber incidents, promoting a culture of security awareness, whilst meeting legal and ethical responsibilities. Developed with input from industry and academic experts, this course is designed to assist those in both technical and non-technical roles. By the end of the course, you'll be prepared to implement best practices that reduce risk, support compliance and protect the trust of those you serve.

Key benefits of this course

This course has been designed to equip you with:

  • The ability to identify, classify and protect sensitive data across its lifecycle
  • Strengthened ability to respond effectively to cyber risks and potential data breaches
  • Practical strategies to meet legal, ethical and organisational data handling obligations
  • Improved confidence in applying frameworks such as the LOCK framework and Defence in Depth
  • The ability to support the development of a cyber-aware culture across technical and non-technical teams
  • Skills that are valuable across sectors, including not-for-profits, government and industry
  • Enhanced professional value, through demonstration of a clear understanding of cybersecurity fundamentals.

Digital badge and certificate

A digital badge and certificate will be awarded following the successful completion of any necessary tasks or assessments to demonstrate acquired learning of the short course or for meeting attendance and/or participation requirements.

Learn more about UTS Open digital badges.

Price

Full price: $100 (GST-free)*

*Price subject to change. Please check price at time of purchase.

Payment on invoice requests must be paid in full and reconciled by our Finance team before you can access your online course materials. Please make sure your invoice payments reference the UTS Open invoice number. You should also forward the remittance advice to support@open.uts.edu.au for more efficient reconciliation.

UTS Cyber Resilience Program

This course is part of our UTS Cyber Resilience program on UTS Open. Our full list of cyber resilience program courses are: 

Each course is stand-alone and does not require completion of other courses. Courses can be studied in any order. 

Enrolment conditions

Course purchase is subject to UTS Open Terms and Conditions.

Course outline

This self-paced course has been designed to be completed in approximately 2 hours, offering a flexible and engaging learning experience for professionals at all levels. A modular structure allows you to progress at your own pace while accessing content that is relevant, practical, and immediately applicable to your environment.

The course modules comprise:

  • Introduction to secure data handling

You'll be introduced to fundamental concepts including the importance of cybersecurity awareness, data sensitivity, and the consequences of data breaches. This module sets the foundation by demystifying technical terminology and presenting real-world examples of risks and incidents.

  • Data classification and lifecycle management

This module focuses on identifying different types of data, including public, confidential and sensitive, aligning treatment with privacy obligations, such as those outlined in Australian data protection legislation. You’ll be guided through the full data lifecycle, from creation and storage to sharing and disposal, using the LOCK framework to reinforce best practices.  

  • Threats, mistakes and risk mitigation

Using real-world case studies and interactive scenarios, this module explores common mishandling errors and introduces you to the concept of "Defence in Depth". Topics include phishing, accidental disclosure, poor password hygiene and insecure storage. Practical tips and workplace-ready checklists are provided.

  • Building a culture of cybersecurity

The final module encourages you to think beyond individual practices by fostering organisational awareness and resilience. This includes strategies for promoting shared responsibility, responding to breaches and building a cyber-aware culture, particularly in resource-constrained environments such as not-for-profits.

Course delivery

The course is designed to be interactive, engaging, and accessible for non-technical audiences. Key features include:

  • Self-paced learning: complete the course at your own convenience, with content available online 24/7
  • Interactive learning: low-stakes quizzes and challenges reinforce understanding in a playful and non-intimidating way
  • Real-world case studies: scenarios from not-for-profits and small businesses help contextualise abstract concepts
  • Downloadable job aids: receive takeaway resources including classification charts, breach response flowcharts, and policy checklists
  • Mnemonic-based learning: discover memorable phrases and visuals to support knowledge retention and future application.

The course assumes no background in cybersecurity and is suitable for those working in operations, communications, compliance, service delivery, or general administration roles. Participants will walk away with a clear understanding of how to classify and protect data, comply with privacy regulations, and promote safer practices in their daily operations. The content is particularly suited to individuals and teams seeking practical, actionable guidance in securing organisational data in line with best practices and regulatory expectations.  

Course learning objectives

By the conclusion of the course, you should be able to:

  • Explain basic concepts of secure data handling, including data classification levels, relevant privacy regulations and organisational policies
  • Recognise common handling mistakes and potential security risks to individuals and organisations
  • Apply and respond effectively to cybersecurity best practices by securely handling data at different classification levels, minimising the risk of unauthorised access and breaches and taking appropriate actions in case of a cyber incident
  • Promote a security-aware culture by understanding the importance of cybersecurity and implementing safe practices within an organisation.

Requirements

To participate in this online course, you will need a personal computer with adequate internet access and an operating system with a web browser compatible with Canvas, the UTS online learning management system.

Contact us

For any questions on enrolment or payment, please email support@open.uts.edu.au 

If you have a specific question on course content or requirements, please email  Brett.Oberstein@uts.edu.au

Who is this course for?

This course is suitable for professionals and teams who work with sensitive or other organisational data, who wish to strengthen their cybersecurity awareness and practices. It is designed for beginners and non-technical staff, but is also relevant for those in operational or compliance roles, including:

  • Early-career professionals and interns working in data-rich environments 
  • Team leaders and managers responsible for building cyber-aware cultures 
  • Anyone in a non-technical role seeking to improve their understanding of data security fundamentals
  • Program and service delivery staff in not-for-profit organisations
  • Administrative, operations, and support personnel
  • Communications and digital engagement teams handling stakeholder or donor data
  • Compliance, governance, or records management staff.


The course is especially valuable for those working without dedicated cybersecurity teams, providing simple, effective tools to reduce risk and promote a culture of data security responsibility.

Book a session

Self paced
Expert: Professor Justin Lipman, Dr Imran Makhdoom
  • Start anytime online
  • Online

Acknowledgement of Country

UTS acknowledges the Gadigal people of the Eora Nation, the Boorooberongal people of the Dharug Nation, the Bidiagal people and the Gamaygal people upon whose ancestral lands our university stands. We would also like to pay respect to the Elders both past and present, acknowledging them as the traditional custodians of knowledge for these lands.

loading