Available Professional Education Programs

the Economy and Innovation</li>

View Professional Education Course Details >>


designed to use simulation tools and equipment to replicate the potential threats against Critical Infrastructure Services (CIS) utilising real life SCADA models. </p>

View Professional Education Course Details >>


</li>

View Professional Education Course Details >>


and mitigation strategies unique to control systems including how attacks are launched and potential mitigations</li>

View Professional Education Course Details >>


this training course provides a comprehensive review of information security concepts and industry best practices

View Professional Education Course Details >>


contact the <a class=email href=mailto:profedcourses@adfa.edu.au target=_blank>Professional Education Course Unit</a>.</p>

View Professional Education Course Details >>


Fourth Edition.</li>

View Professional Education Course Details >>


as your rate is already discounted.</p>

View Professional Education Course Details >>


privacy and ethics issues</li>

View Professional Education Course Details >>


looking at the types of attacks that are happening at the moment

View Professional Education Course Details >>


Wikileaks and Open Secrets</li>

View Professional Education Course Details >>


France and Israel as Cyber Actors in Asia</li>

View Professional Education Course Details >>


UAE

View Professional Education Course Details >>


Turkey

View Professional Education Course Details >>


Terrorism and Cyber Assets</li>

View Professional Education Course Details >>


to appreciate the main policy dilemmas emerging in their exploitation

View Professional Education Course Details >>


but not limited to:</p>

View Professional Education Course Details >>


techniques and procedures involved with Computer Network Operations (CNO). Students will explore and develop competence in addressing strategic

View Professional Education Course Details >>


<a href=https://unsw.adfa.edu.au/study/professional-education-courses/intrusion-analysis-and-response>Intrusion Analysis and Response</a> (5 days)</p>

View Professional Education Course Details >>


doctrine

View Professional Education Course Details >>


delegates will need to be familiar with cyber exploitation terms and meanings. All participants will need to hold an Australian Government Security clearance.</p>

View Professional Education Course Details >>


Access

View Professional Education Course Details >>


e.g. DNS enumeration

View Professional Education Course Details >>


footprint

View Professional Education Course Details >>


data analytics

View Professional Education Course Details >>


students will come to understand:</em></strong></p>

View Professional Education Course Details >>


including risk

View Professional Education Course Details >>


and identify which security control(s) are appropriate for the development environment

View Professional Education Course Details >>


how to go about identifying the functionality of malware

View Professional Education Course Details >>


malware analysts

View Professional Education Course Details >>


policy or operations. Delegates will develop a detailed understanding of the processes

View Professional Education Course Details >>


View Professional Education Course Details >>


in areas ranging from information technology and engineering to law and politics

View Professional Education Course Details >>


lunch and afternoon tea.</li>

View Professional Education Course Details >>


small practical exercises and major in-class programming assignments known as Toolkit Development (TKD) sessions. Each TKD is designed to provide the student with a tool suitable for immediate deployment upon their return to the workplace

View Professional Education Course Details >>


mobile phones as well as other devices. This course assumes knowledge from <a href=https://unsw.adfa.edu.au/study/professional-education-courses/cyber-security-boot-camp>Cyber Security Boot Camp</a>.</p>

View Professional Education Course Details >>


IT/Cyber professionals

View Professional Education Course Details >>


various discovery and attack techniques.</p>

View Professional Education Course Details >>


not just an IT issue.</li>

View Professional Education Course Details >>


and discussions about cyber-risk management should be given regular and adequate time on the board meeting agenda.</li>

View Professional Education Course Details >>


but can be modified to meet the needs of particular client or institutions. They can be run at most times of the year with the exception of the period between 10 December and 27 January each year.</p>

View Professional Education Course Details >>