Skip to main content
SHORT COURSE

Cyber Analyst Toolkit

$1,950.00

START DATE

Enquire now

MODE

Online

DURATION

32 hrs

COMMITMENT

4 weeks

Join Waitlist








Have a question ?

Cybersecurity teams face an ever-evolving threat landscape, requiring advanced skills to detect and prevent attacks. Education is essential to staying proactive and to foster a culture of security awareness.

About this course

This course is a collaboration between UTS and ITIC. itic logo

During this course you will acquire knowledge and develop skills through a series of multi-level learning challenges that reinforce cyber-skills, including computer forensics, cyberthreat intelligence, penetration testing, vulnerability management, detection and response. These insights will assist organisations promote a culture of security awareness through proactively focusing on understanding risks, continuous monitoring and implementing robust controls. This approach ensures teams will be equipped to effectively combat emerging cyber risks and maintain a strong defence against new and persistent threats.

Key benefits of this course

This course is a practical and effective way to prepare for the challenges encountered in the field. Participants will have the opportunity to:

  • Gain hands-on experience in realistic lab environments
  • Reinforce cybersecurity knowledge through using real-world tools
  • Learn how to monitor, identify, investigate and respond to cyber threats
  • Seek and exploit vulnerabilities in a computer system
  • Acquire investigative and analytical techniques to gather and preserve digital evidence.

Digital badge and certificate

A digital badge and certificate will be awarded following the successful completion of any necessary tasks or assessments to demonstrate acquired learning of the short course or for meeting attendance and/or participation requirements.

Learn more about UTS Open digital badges.

Course outline

This course is delivered in a scheduled format over 4 weeks (32 hours of learning in total). The online workshops are led by industry experts and will be conducted weekly on Wednesday and Friday afternoons from 1pm to 5pm.

The following key areas will be covered during the course:

Forensics Analysis

Use forensic tools to gather and present evidence needed to support an intrusion case.

Tools:

  • Autopsy
  • Registry Explorer
  • DCODE
  • OphCrack
  • USB Historian

Cyberthreat intelligence

Learn how to integrate, interpret, evaluate, and analyse processed raw data to transform it into actionable intelligence.

Tools:

  • Wireshark
  • Azure Monitor
  • Microsoft Sentinel

Vulnerability Management, Detection and Response

Learn how to scan for vulnerability, identity weaknesses in the security posture and fix potential security issues.

Tools:

  • Qualys VMDR

Penetration Testing

Use Kali Linux penetration testing tools to conduct authorised simulated cyberattacks on a computer, aiming to compromise its defences and identify potential vulnerabilities.

Tools:

  • Nmap
  • Metasploit

Course learning objectives

Upon successful completion of this course, participants should be able to:

  • Identify and remediate security vulnerabilities
  • Implement security controls within an enterprise using cloud-native architecture and technologies
  • Conduct digital forensics investigation using forensic tools to research and provide the necessary evidence needed to support a case of an intrusion
  • Maintain an organisation’s security posture, and gather intelligence by employing reconnaissance, and scanning tools.  

Requirements

  • Basic knowledge of IT systems, and security concepts  
  • To participate in this online course, you will need a personal computer with adequate internet access, web conferencing capability and an operating system with a web browser compatible with Canvas, Zoom and Microsoft Teams.

Enrolment conditions

Course purchase is subject to UTS Open Terms and Conditions. 

COVID-19 response 

UTS complies with latest Government health advice. Delivery of all courses complies with the UTS response to COVID-19.

Contact us

For any questions on enrolment or payment, please email support@open.uts.edu.au 

If you have a specific question on course content or requirements, please email FEITshortcourses@uts.edu.au

Who is this course for?

This course is suitable for anyone with prior knowledge of IT systems and security concepts aiming to acquire job-ready skills and get hands-on experience to prepare for a career in cybersecurity.

Acknowledgement of Country

UTS acknowledges the Gadigal people of the Eora Nation, the Boorooberongal people of the Dharug Nation, the Bidiagal people and the Gamaygal people upon whose ancestral lands our university stands. We would also like to pay respect to the Elders both past and present, acknowledging them as the traditional custodians of knowledge for these lands.

loading