Diploma of Information Technology (Cyber Security)

Study what you love while living the life you dream of.

Cyber security engineers are in high demand all over the world as the entire world is changing to digital transformation. Due to the this the data is moved to the cloud which increases the cyber security risks and threats. Hence the organizations require constant vigilance and preparation to thwart attacks and have contingency and disaster recovery plans to protect IP and data. 

Albright Institute’s ICT50220 Diploma of Information Technology (Cyber Security) promotes the foundation skills for cyber security individuals for understanding cyber security awareness and learning to respond to cyber security threats.

You will also develop the skills required to design, build and test network servers, apply IP, ethics and privacy policies in ICT environments, identify, confirm and respond to cyber security incidents, manage network security, utilise design methodologies for secure architecture, lead and facilitate a team, manage ICT infrastructure projects, and develop, implement and evaluate incident response and disaster recovery plans.

Individuals in the ICT roles carry out moderately complex tasks in a specialist field, working independently, as part of a team or leading a deliverable with others. They may apply their skills across a wide range of industries, business functions and departments, or as a business owner (sole trader/contractor).

Enter a pathway into ICT60220 Advanced Diploma of Information Technology (Cyber Security) at Albright Institute.

This qualification provides Opportunities in roles like

  • Cyber Security Analyst
  • ICT Systems Administrator
  • Network Support Technician
  • IT Support Analyst/Technician
  • Assistant IT Manager
  • ICT Consultant
  • Applicants must be minimum 18 years of age at the time of commencement;
  • Have a valid Student visa status which allows them to study in Australia in Vocational levels.
  • Must satisfy Albright Pre-training Review (PTR) Assessment.
  • Have a valid IELTS score of 5.5 or PTE score of 42 or Cambridge English Test Result B2 or its equivalent (Completed a minimum 12-Week General English Course of Upper-Intermediate Level)- Within the last 2 Calendar Years
    OR
    Completed Australian Qualification minimum AQF Level 4 (Certificate 4) or Australian Senior Secondary Certificate of Education- Within the last 2 Calendar Years
  • Successful completion of Australian Equivalent Year 12 qualification;
  • Applicants must undertake the Albright LLN test;
  • Applicants should have basic computer and MS Office skills (Word, Excel and Power Point);
  • Total number of units = 20
  • 6 core units
  • 14 elective units 

2 years (104 weeks)

Melbourne, Sydney, Adelaide & Brisbane

Core Units:

BSBCRT512 Originate and develop concepts

BSBXCS402 Promote workplace cyber security awareness and best practices

BSBXTW401 Lead and facilitate a team

ICTICT517 Match ICT needs with the strategic direction of the organisation

ICTICT532 Apply IP, ethics and privacy policies in ICT environments

ICTSAS527 Manage client problems

Elective Units:

ICTCYS407 Gather, analyse and interpret threat data

ICTCYS610 Protect critical infrastructure for organisations

ICTCYS613 Utilise design methodologies for security architecture

ICTSAS524 Develop, implement and evaluate an incident response plan

ICTSAS526 Review and update disaster recovery and contingency plans

ICTICT519 Develop detailed component specifications from project specifications

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry

ICTNWK423 Manage network and data integrity

ICTNWK541 Configure, verify and troubleshoot WAN links and IP services

ICTPMG505 Manage ICT projects

ICTTEN519 Design network building projects

ICTNWK529 Install and manage complex ICT networks

ICTNWK536 Plan, implement and test enterprise communication solutions

ICTNWK540 Design, build and test network servers

 

Typical Timetable Block*

AM Schedule Block

Start

End

Period 1

9:00 AM

12:30 PM

Break

12:30 PM

1:00 PM

Period 2

1:00 PM

4:30 PM

PM Schedule Block

Start

End

Period 1

2:00 PM

5:30 PM

Break

5:30 PM

6:00 PM

Period 2

6:00 PM

9:30 PM

 

Compulsory Training Hours:
14 Hours on Campus Training + 6 Hours Online Per Week**


*A typical week consists of two days of classes, each with two periods scheduled in either the AM or PM block.


**Timetables specific to each course or cohort are released before the start of the commencement week and updated at the beginning of each term.

Training at Albright is a combination of facilitated learning activities using a combination of theory and research. The different range of activities could be demonstrations, role plays, presentations and individual classroom and group activities.

  • Students are required to attend a total of 14 hours of face-to-face scheduled training + 6 hours of structured online learning activities to complete the compulsory 20 contact hours per week requirement of the International Student visa.
  • Students who have completed their orientation can access their current timetable, classroom & session details at Albright LMS: https://albrightinstitute.ai-one.io/
  • Current students can review their ongoing course progress by accessing the Albright LMS https://albrightinstitute.ai-one.io/
  • Timetable is subject to change.

During the training sessions, participants are required to bring their own device in order to complete work simulated activities in classroom.
BYOD minimum requirements are as follows:

  • Operating System: Windows 8 Home Edition or later
  • Processor: Intel Core i3 / AMD 2.0 Ghz or better
  • RAM: Minimum 4 GB, recommended 8GB
  • Hard Drive: 128GB SSD (256GB SSD recommended if not using Cloud storage) Display: 13 inch full HD (1920 x 1080) with a built-in webcam
  • WiFi: 802.1x compliant
  • USB Headsets with microphone
  • Device must be fully charged

BYOD stands for bring your own device, and the most commonly accepted BYOD meaning is when students use their own personal devices to connect to the LMS and access what they need to do their tasks and attend classes. This includes data and information that could be potentially sensitive or confidential, so here are some tips to ensure you maximize the security!

One of the most common best practices listed in a BYOD policy is for users to have installed some kind of security software on their personal devices. This includes antivirus software, mobile device management (MDM) software, and unified endpoint management (UEM) software.

✔ Try not to leave your device unattended.
✔ Ensure someone is looking it after if you are briefly absent.
✔ Save your work on an external portable memory.
✔ Bring your device charger: AIBL will ensure to provide power points along all facilities in campus for your convenience.

FAQs

Why is a BYOD policy important?
Enables students to bring your own device that typically already know how to use it and avoid complex security protocols.
What are the best practices of BYOD security?
Use strong passwords, determine the kinds of sensitive data, place mobile security tools on devices, choose time-based lockout features, and determine how to wipe sensitive information off the user’s device.

What is a BYOD example?
The devices used for BYOD could include tablets, personal computers & laptops

Contact Us

Want more information about our courses?

Submit your contact details here and we will get back to you as soon as possible.

We can help you!