Home

Dino DeFazio | Education

Graduate Certificate in Cyber Security Management

Swinburne University of Technology

Study in Cyber Security Management has deepened my depth of knowledge across the governance, risk, and strategic management of information security within organisations.

It has elevated my capability to critically analyse cybersecurity within organisational contexts, balancing organisational objectives with individual rights and privacy considerations. I can apply knowledge across the interrelated social, technical, legal and ethical dimensions of computer technology, and critically review emerging cybersecurity literature to inform practice. This includes applying research principles and methods to plan and undertake independent investigation. I also demonstrate autonomy, expert judgement, adaptability and professional responsibility in cybersecurity practice and ongoing learning.

view testamur

Networks and Cybersecurity Frameworks

CYB60004

Management of networks and cybersecurity frameworks are fundamental to the protection of identity and data. This unit explores cryptography, network fundamentals, security tools, and the concepts of layered security. It examines a broad range of attack vectors that are used in the infiltration of cyber networks. Completion of this unit strengthened my capability to:

  1. Develop and implement strategies relating to network security issues and threat mitigation
  2. Integrate different security measures and access controls to provide enhanced levels of security
  3. Communicate and disseminate business wide policy in relation to network security with a focus on cybersecurity frameworks
  4. Evaluate and recommend appropriate solutions to emerging network security issues
  5. Analyse a variety of network auditing and forensic tools used to explore or prevent network security incidents

Cybersecurity Law, Policy and Ethics

CYB60003

The changing nature of cyber security threats requires managers to maintain an up-to-date tool kit in relation to cyber law and policy. The unit focuses on the effective operation in the cyber security governance arena by implementing frameworks and developing policy responses to issues that arise. Completion of this unit deepened my capability to:

  1. Critically evaluate the legal and regulatory structure for dealing with cyber security both domestically and internationally
  2. Analyse cyber security policy and law in Australia and their application to business
  3. Research and analyse the international standards that support cyber security governance frameworks in Australia
  4. Critically analyse ethics in relation to governance and policy in cyber security

Cybersecurity Operations Management

CYB60002

Cyber security of an organisation concerns all stakeholders, employees and customers. This unit focuses on the management of resources related to stakeholder management and communications, using communication protocols, cyber security principles, recovery and mitigation strategies. Completion of this unit elevated my capability to:

  1. Explain cyber security imperatives and implications to principle decision makers in an organisation
  2. Critically evaluate the cyber security culture of an organisation
  3. Analyse cyber security framework for an organisation against industry best practice
  4. Examine the cyber security implications of the internet in relation to an organisation and the implications to business continuity
  5. Examine and refine business continuity and disaster recovery plans and strategies as they relate to cyber security

How to Think Like a Hacker: an anatomy of cyber attacks

CYB60001

Understanding the adversary is a first step to countering cybersecurity threats. This unit focuses on the mindsets, methods and motivations of the key actors: hackers. Completion of this unit expanded my capability to:

  1. Critically review different forms of hacking behaviour and understand the mindsets and the motivations behind hacking
  2. Identify and differentiate the various tactics that hackers use in breaching communication networks and information system
  3. Explain and measure the profit models and value chain behind hackers' activities
  4. Critically evaluate standard business security practices from the viewpoint of a hacker
  5. Recommend processes and practices to reduce the likelihood of data breaches

Thanks for taking the time to explore my learnings in this area of study

return to the top