Course

Cyber Security Basics: Attacks and Defences

Time limit: 120 days

$150 Enrol

Full course description

About this course

Sign up now - start now!

Welcome to the Attacks and Defences course, where you will learn about malware, other attack technologies and how cyber security principles and practices can be applied to defending yourself and your organisation.

This course will provide you with a starting point in understanding these aspects of cyber security, enabling you to consider the real-world challenges. By the end of this course, you will have gained valuable insights into the various aspects of attacks and defences used, which will enhance your employability and lay the foundation for future studies.

Delivery Mode

Delivered online in self-paced mode, you will have 120 days from the time of your purchase to complete the training. As this is an online self-paced course there is no requirement to attend any live sessions. You can access and complete the online course 24/7 during your access.  After the 120 days you will lose access to the course.

 

Start Anytime
Access the course straight away
5 Modules
120 days to complete
Online
Self-paced learning
150
Pay Now / Start Now

Course Snapshot

What are the course learning outcomes?

This course will provide you with a starting point in understanding these aspects of cyber security, enabling you to consider the real-world challenges. By the end of this course, you will have gained valuable insights into the various aspects of attacks and defences used, which will enhance your employability and lay the foundation for future studies.

What core topics are offered?

Course Modules

Here's a brief overview of the modules you will work through in this course:

  • Malware attacks: Dive into the world of malware, including viruses, worms, and Trojans. Learn how these malicious programs operate and get to know your cyber adversaries.
  • Malware analysis, detection and response: Now that you are aware of what form malware attacks take, we will look at how analysis and detection occurs and what effective responses look like.
  • Security operation and incidence management (SOIM): An introduction to structured approaches to handling security operations using industry accepted frameworks that will help you understand and explain the concepts and identify common data sources used for security monitoring.
  • Intrusion detection and prevention: In this module you will see how data sources influence detection processes, other approaches to intrusion detection methods and available countermeasures.
  • Digital forensics: We will start with some conceptual models and processes and then move onto some details on how digital forensic analysis is used in cyber security.
Who is this course suited to?

Anyone interested in learning more about cyber security

What are the course credentials?

Upon completion of this course earn a Digital Badge. 

What does my course schedule look like?

This course is made up of a series of modules that are best used in sequence. While there is no set timetable with this course, a study plan is a valuable tool to help manage your time, stay motivated and that all materials a covered.

Everyone learns at a different pace, and the times for each module are an average. It may take you less or more time depending on what you already know and previous experiences.

 Suggested study schedule

Topic Hours of study
  • Malware attacks
  • 1-2 hours
  • Malware analysis, detection and response
  • 1-2 hours
  • Security operations and incident management
  • 1-2 hours
  • Intrusion detection and prevention
  • 1-2 hours
  • Digital forensics
  • 1-2 hours
Who are the course facilitators?

Professor Ernest Foo

Professor, School of Information and Communication Technology

Griffith University Profile

Dr. Zahra Jadidi

Lecturer, School of Information and Communication Technology

Griffith University Profile