Skip to main content
SHORT COURSE

Cyber Analyst Toolkit

$ 1,950.00

START DATE

07 May

MODE

Online

DURATION

32 hrs

COMMITMENT

4 weeks

Make an enquiry

Have a question?

















Meet the Expert

Wade S. Irvin

Wade S. Irvin

Wade is a qualified information technology and security professional with diverse experience in governance of enterprise IT, Information security management systems (ISMS), compliance and risk management. He received a postgraduate qualification in cybersecurity from CSU and multiple certificates in cybersecurity management curriculum for the NIST/NICE Cybersecurity Workforce Framework with area of specialty in security operations (CCSOM | Certified Cybersecurity Operations Manager), incident response (CCIRM | Certified Cybersecurity Incident Response Manager), and disaster recovery (CDRRM | Certified Disaster Recover and Response Manager). 

Wade has additionally received the ISO 27001:2022 ISMS Lead Auditor certificate from the British Standards Institution (BSI) and several vendor-specific certifications awarded by Microsoft, Cisco, etc. He is member of the Australian Information Security Association (AISA), IT Operations Manager of epay ANZ, and is the Cybersecurity team lead at ITIC.

More Less

Cybersecurity teams face an ever-evolving threat landscape, requiring advanced skills to detect and prevent attacks. Education is essential to staying proactive and to foster a culture of security awareness.

About this course

During this course you will aquire knowledge and develop skills through a series of multi-level learning challenges that reinforce cyber-skills, including computer forensics, cyberthreat intelligence, penetration testing, vulnerability management, detection and response.

These insights will assist organisations promote a culture of security awareness through proactively focusing on understanding risks, continuous monitoring and implementing robust controls. This approach ensures teams will be equipped to effectively combat emerging cyber risks and maintain a strong defence against new and persistent threats.

Key benefits of this course

This course is a practical and effective way to prepare for the challenges encountered in the field. Participants will have the opportunity to:

  • Gain hands-on experience in realistic lab environments
  • Reinforce cybersecurity knowledge through using real-world tools
  • Learn how to monitor, identify, investigate and respond to cyber threats
  • Seek and exploit vulnerabilities in a computer system
  • Acquire investigative and analytical techniques to gather and preserve digital evidence.

Course outline

This course is delivered in a scheduled format over 4 weeks (32 hours of learning in total). The online workshops are led by industry experts and will be conducted weekly on Wednesday and Friday afternoons from 1pm to 5pm.

The following key areas will be covered during the course:

Forensics Analysis

Use forensic tools to gather and present evidence needed to support an intrusion case.

Tools:

  • Autopsy
  • Registry Explorer
  • DCODE
  • OphCrack
  • USB Historian

Cyberthreat intelligence

Learn how to integrate, interpret, evaluate, and analyse processed raw data to transform it into actionable intelligence.

Tools:

  • Wireshark
  • Azure Monitor
  • Microsoft Sentinel

Vulnerability Management, Detection and Response

Learn how to scan for vulnerability, identity weaknesses in the security posture and fix potential security issues.

Tools:

  • Qualys VMDR

Penetration Testing

Use Kali Linux penetration testing tools to conduct authorised simulated cyberattacks on a computer, aiming to compromise its defences and identify potential vulnerabilities.

Tools:

  • Nmap
  • Metasploit

Course learning objectives

Upon successful completion of this course, participants should be able to:

  • Identify and remediate security vulnerabilities
  • Implement security controls within an enterprise using cloud-native architecture and technologies
  • Conduct digital forensics investigation using forensic tools to research and provide the necessary evidence needed to support a case of an intrusion
  • Maintain an organisation’s security posture, and gather intelligence by employing reconnaissance, and scanning tools.  

Requirements

  • Basic knowledge of IT systems, and security concepts  
  • To participate in this online course, you will need a personal computer with adequate internet access, web conferencing capability and an operating system with a web browser compatible with Canvas, Zoom and Microsoft Teams.

Enrolment conditions

Course purchase is subject to UTS Open Terms and Conditions. 

COVID-19 response 

UTS complies with latest Government health advice. Delivery of all courses complies with the UTS response to COVID-19.

Contact us

For any questions on enrolment or payment, please email support@open.uts.edu.au 

If you have a specific question on course content or requirements, please email FEITshortcourses@uts.edu.au

Who is this course for?

This course is suitable for anyone with prior knowledge of IT systems and security concepts aiming to acquire job-ready skills and get hands-on experience to prepare for a career in cybersecurity.

Book a session

Wed 07 May 2025-
Fri 30 May 2025
Expert: Wade S. Irvin
  • Online via Zoom. Click on the underlined sessions and hours total link below to reveal specific session details.
  • Online
  • 8 sessions, 32 hours total

Enrolments close at 11.59pm Wednesday 7 May 2025 (AEST), or when all places have been filled, whichever occurs first.

Wed 16 Jul 2025-
Fri 08 Aug 2025
Expert: Wade S. Irvin
  • Online via Zoom. Click on the underlined sessions and hours total link below to reveal specific session details.
  • Online
  • 8 sessions, 32 hours total

Enrolments close at 11.59pm Wednesday 16 July 2025 (AEST,) or when all places have been filled, whichever occurs first.

Acknowledgement of Country

UTS acknowledges the Gadigal people of the Eora Nation, the Boorooberongal people of the Dharug Nation, the Bidiagal people and the Gamaygal people, upon whose ancestral lands our university stands. We would also like to pay respect to the Elders both past and present, acknowledging them as the traditional custodians of knowledge for these lands.

loading