Updating Results

University of Melbourne

  • 37% international / 63% domestic

Cybersecurity Management: Cybersecurity: Technologies for Defence

  • Non-Award

Expand your understanding of the technologies that defend organisations against cyber threat. Develop in-demand skills aligned with industry best practice, learn from leading experts, and earn a shareable digital certificate.

Key details

Degree Type
Non-Award
Duration
4 - 4 weeks full-time
Study Mode
Online
International Fees
$1,190 per year

About this course

Cybersecurity: Technologies for Defence

Expand your understanding of the technologies that defend organisations against cyber threat.

Level up with micro-credentialsIndustry-ready skills

Develop in-demand skills aligned with industry best practice you can apply immediately.

Taught by leading experts

Learn from internationally recognised academics and professionals with years of on the ground experience.

Shareable digital certificate

Showcase your capabilities with an industry recognised digital certificate you can share with your professional network.

Entry requirements

To enrol, you require an undergraduate degree in any discipline.

Study locations

Online

What you will learn

What you will learn

Gain contemporary skills and knowledge for your job now.

As cybersecurity threats become increasingly frequent and sophisticated, organisations of all stripes require the expertise to remain secure.

This course is ideal for all cybersecurity managers wanting to gain a sound understanding of the technologies that play a key role in organisations' perimeter and interior defences.

Developed with the Academic Centre of Cybersecurity Excellence (ACCSE), this course is aligned with industry standards.

Explore technologies for perimeter defence

Examine a range of technologies that construct a protective 'shield' and build a secure perimeter for organisations. Consider potential perimeter vulnerabilities and the role and function of firewalls and VPN technologies.

Examine technologies for interior defence

Consider technologies that build interior defences, including the role, function and vulnerabilities of identity and access management, intrusion detection systems and anti-malware solutions.

Apply your knowledge in a case analysis

Drawing on your new knowledge, you'll conduct a case analysis of the deficiencies in cybersecurity technologies in the perimeter and interior defences of an organisation, and recommend how to improve them.

Course structure

Course details

This course runs over four weeks, which includes one pre-teaching week, two weeks of teaching delivery, and one week for assessment.

Your total time commitment is approximately 42 hours, which includes:

  • 8 hours guided online learning
  • 15 - 20 hours independent study
  • 15 - 20 hours assessment tasks.

Assessment:

  • Case analysis of an organisation's cybersecurity technology deployment (100%).