Module 1 Intro to CybersecurityScript
Module 1 Intro to CybersecurityScript
3. Module 3 – Networks
4. Module 4 – Digital Forensics
5. Module 5 – Cybersecurity Tools
Each module is accompanied with knowledge checks in the form of multiple-choice quizzes,
content-relevant tasks, or a combination of both.
If you are interested in a career in cybersecurity, please submit the answers to your knowledge
checks at the end of each module within The Forage platform as advised so that they are
provided to Untapped for review. Your answers cannot be changed once submitted, so please
ensure you check them beforehand.
Don’t worry, we don’t expect you to answer everything correctly! What might happen is that
you are referred to additional courses or an assessment centre so that you can further explore
whether this is a good career choice for you.
Continued learning resources are also provided within each module so that you can do
additional solo-research into topics of interest.
Feel free to pause the course at any time. Modules can be completed independently of one
another and do not need to be completed in one sitting. Once your responses are submitted for
any given module, they will remain submitted permanently.
If you want to read the full strategy, refer to the Australian Government Home Affair’s website
in the link in this module’s script.
Australia’s Cybersecurity Strategy 2020
https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
Confidentiality – you send the message and no one else knows what the message is. This can be
achieved through encryption
Integrity – you send the message, and it is exactly the same when it is received. The data has
not been tampered with and this can be achieved through hashing and digital signatures
Availability – you send the message, and the recipient is able to receive it.
This coupled with the fact the cybersecurity is still a growth industry, expected to triple in the
next ten years, means that the industry has a 0% unemployment rate. What this means is that
there are a lot more jobs available in comparison to qualified people who have the skills and
experience to fill those positions. Demand could not be higher, and companies are doing
everything they can hold on to their cybersecurity staff whilst concomitantly trying to lure staff
from other companies to join them.
Not to mentioned that if you start a career in cybersecurity, you’d be working for the good
guys! Every day is a battle trying to protect people and companies from malicious threats. If you
talk to any cybersecurity professional, they’ll tell you that nothing beats the satisfaction they
get from applying their professional skills both at work and at home.
Feel free to explore the interactive framework through the link below whilst we take you
through some of the key categories, roles and tasks.
https://www.austcyber.com/resources/dashboards/NICE-workforce-framework
Categories overview
As mentioned, there are seven categories in the NICE Workforce Framework. Each of these and
their definitions are as follows:
Securely Specialty areas concerned with conceptualizing, designing, and building secure
Provision IT systems.
Specialty areas responsible for providing the support, administration, and
Operate and
maintenance necessary to ensure effective and efficient IT system performance
Maintain
and security.
Protect and Specialty area responsible for the identification, analysis and mitigation of
Defend threats to IT systems and networks.
Specialty areas responsible for the investigation of cyber events or crimes
Investigate
which occur within IT Systems and networks.
Specialty areas responsible for the highly specialized and largely classified
Operate and
collection of cybersecurity information that may be used to develop
Collect
intelligence.
Specialty area responsible for highly specialized and largely classified review
Analyze
and evaluation of incoming cybersecurity information.
Specialty areas that provide critical support so that others may effectively
Support
conduct their cybersecurity work.
Support Analyze
Legal Advice and Advocacy Cyber Threat Analysis Exploitation
Education and Training Analysis Targets
Strategic Planning and Policy Development All Source Intelligence
Pause this video now and take a moment to navigate around the interactive framework in the
link below. Have a think about what specialty areas might be of interest to you, however, do be
aware that as you learn more about the cybersecurity industry, you may find that what appeals
to you drastically changes. You may also find that your specific skills are more appropriate to
certain specialties you didn’t first consider.
https://www.austcyber.com/resources/dashboards/NICE-workforce-framework
BLUE TEAM: is a group of analysts and engineers responsible for the defence of an organisation
from cyber-attacks through a combination of threat prevention, deception, detection and
response. A malicious actor has potentially unlimited resources and only has to find one
weakness to compromise an organisation. Blue teams are faced with the exciting challenge of
using what they already have and what they can get to protect their organisation.
SECURITY OPS CENTRES: known as SOCs are the collective term for all components of a
company’s cybersecurity team and is a part of the blue team. They act as the intelligence hub of
a company, gathering real-time data relating to an organisation’s people, networks, servers and
other digital assets.
They are responsible for monitoring and analysing an organisation’s security posture on an
ongoing basis. They utilize a combination of technological solutions and policy-driven
approaches to detect, analyse and respond to security issues. Essentially, they are responsible for
the ongoing, operational component of information security, rather than for developing
security strategy or architecture.
The remainder of this course will cover introductory level concepts for some key fundamentals
of the cybersecurity industry. We hope you enjoy!