top of page
Pedestrain Bridge

Available Online

Introduction to Cyber Warfare

Cyber Security and Data Protection

Ended
1,700 Australian dollars
online course

Service Description

When exactly did information security become cyber warfare? What changed? How do modern attacks against information systems differ from what hacking was 5-10 years ago? Old defence doctrines are ineffective against modern APT-like scenarios. Successful attacks are no longer measured by whether the perimeter was breached. The student learns to understand that the breach is inevitable and true defences are organic, highly-iterative, mixed approached and heavily dependent on human resource. Effective security operations have to correspond to the modern kill-chain, so before security can be implemented, specific attack scenarios should be carefully examined. The student will understand the concepts of reactive vs. proactive security.


Contact Details

+61 8 9382 2811

uzy@cellcyber.com.au


bottom of page