Skip to main content
Menu Menu

ICT40120 Certificate IV in Information Technology (Cyber Security Incident Response)

ICT40120 Certificate IV in Information Technology (Cyber Security Incident Response)

National ID ICT40120 State ID AC13

Become a skilled and trusted professional in a fast-growing industry! 

Year long course - commences in January 2024

In a world where cyber-attacks are increasing, now is the time to gain in demand skills that can form the foundation for a career and...

Image
Networking & cyber course image

This course remains FEE FREE in 2024! The course fees are 100 per cent subsidised by the WA State Government for WA residents.

Some eligibility conditions apply for the free training, and other fees may apply for some courses. Please see the FAQs on our Skills Ready page for further information.

^ Please note: Eligibility requirements apply to some of the free training.

When Semester 1, 2024.

Study Mode On campus.

Become a skilled and trusted professional in a fast-growing industry! 

Year long course - commences in January 2024

In a world where cyber-attacks are increasing, now is the time to gain in demand skills that can form the foundation for a career and a job of the future in cyber security. After completing the Certificate IV in Information Technology (Cyber Security Incident Response) you will be an attractive applicant for in-demand IT roles such as cyber security officer.

Training Outcomes

This qualification reflects the role of individuals who are job ready and competent in a wide range of information and communications technology (ICT) where they are required to respond to complex cyber security risks in organisations in information and communications technology (ICT) environments.

The skills required for these roles may include, but are not restricted to:

  • Understanding how the business can be compromised (email attacks, cyber criminals, threats, impersonation tactics)
  • Ransomware as a service (RaaS)
  • Working remotely due to COVID 19 – crisis management plans with remote working from home
  • Fileless attacks – malicious software that uses legitimate programs to infect your computer (viral threats, infected files) using strategies to block these attacks
  • Mobile threats
  • Cloud services compromised - guessing passwords (emails and systems)
  • Collaboration platforms as new attack vectors – (Zoom, teams, Google drive, MS One Drive and Teams)
  • The internet of things – continuously connected both at work and home (web-connected devices range from laptops, smartphones, smart watches, smart locks, personal assistance
  • Application programming interface (API) vulnerabilities and breaches – security readiness
  • Distributed denial of service (DDos) Attacks
  • Programming in python and understanding organisational polices and processes for cyber security

Important information

Select your preferred campus and apply

No availability found

We are currently taking expressions of interest for this course. Contact our student services team on 1800 672 700 for more information or complete the course enquiry form below. 

Course Enquiry

Course enquiry form