CERTIFICATE IV IN INFORMATION TECHNOLOGY CYBER
SECURITY & ARTIFICIAL INTELLIGENCE

COURSE OVERVIEW

The Certificate IV in Information Technology – Cyber Security & Artificial Intelligence – delivers in-depth hands-on practical training in cyber security operations, administration, and analytics. The program wraps cyber security skills around the day-to-day tasks of the M365 endpoint administrator while preparing students for the role of Cyber Security Architect. The content is contextualised for Microsoft 365, Microsoft Azure, and Microsoft Endpoint Management. The content also explores new AI threats in the cyber security landscape and new AI tools to defend against current and emerging threats. The program prepares students for the following roles:

  • Microsoft Identity and Access Administrator
  • Microsoft 365 Endpoint Administrator
  • Microsoft Security Operations Analyst
  • Microsoft Cybersecurity Architect

As a traineeship this program is delivered entirely online via several high-quality online learning environments including video and interactive audio-visual environments, and cloud hosted lab environments. It combines live streamed and recorded instructor led theory classes, practical sessions involving small group and individual activities, and eLearning. Some subjects include supervised self-paced tutorial style training. The training makes use of interactive instructional software, computer-based simulations, and virtual environments. Students will be awarded the qualification on successful completion of all the assessment activities in the course.

The program enables students attain industry recognised credentials by providing the relevant training within the curriculum. Successful completion of the program does not on its own entitle a student to the related certification. External certification exams must be passed to obtain the respective certifications. Exam fees will be charged by the certifying authorities. Information about how to obtain these certifications can be requested from the instructor. While students are encouraged to obtain the certifications, these are not required to successfully complete the qualification and be granted the associated academic award.

CURRICULUM

Curriculum

Python is a programming language that lets you work more quickly and integrate your systems more effectively. Python is developed under an OSI-approved open-source license, making it freely usable and distributable, even for commercial use. On successful completion students should be able to:

  • Explore the choices available to run Python apps
  • Use the Python interpreter to execute statements and scripts
  • Learn how to declare variables
  • Build a simple Python app that takes input and produces output

This subject provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. The fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services are discussed and explored. On successful completion students should be able to:

  • Describe the concepts of security, compliance, and Identity
  • Describe the capabilities of Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
  • Describe the capabilities of Microsoft security solutions
  • Describe the capabilities of Microsoft compliance solutions

The subject covers the design, implementation, and operation of an organization’s identity and access management systems using Microsoft Entra ID. It covers tasks such as providing secure authentication and authorization access to enterprise applications. The focus is on adaptive access and governance, troubleshooting, monitoring, and reporting.
On successful completion students should be able to:

  • Implement an identity management solution
  • Implement an authentication and access management solution
  • Implement access management for apps
  • Plan and implement an identity governance strategy

The subject covers deploying, configuring, protecting, managing, and monitoring devices and client applications in both a Microsoft 365 environment, and On-premises. The focus is on managing identity, security, access, policies, updates, and apps for endpoints, and implementing solutions for efficient deployment and management of endpoints on various operating systems, platforms, and device types.
On successful completion students should be able to:

  • Plan, develop, and implement an Operating System deployment, upgrade, and update strategy.
  • Understand the benefits and methods of co-management strategies.
  • Plan and implement device enrolment and configuration.
  • Manage and deploy applications and plan a mobile application management strategy.
  • Manage users and authentication using Azure AD and Active Directory DS.
  • Deploy Windows client
  • Manage identity and access
  • Manage, maintain, and protect devices

Students should learn how security operations analysts secure information technology systems for organizations by reducing organizational risk, rapidly remediating active attacks, advising on improvements to threat protection practices, and referring violations to appropriate stakeholders.

The subject covers threat management, monitoring, and response using a variety of security solutions across the organizational environment. The content covers investigating, responding to, and hunting for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products, including the configuration and deployment of these technologies. On successful completion students should be able to:

  • Mitigate threats using Microsoft 365 Defender
  • Mitigate threats using Microsoft Defender for Cloud
  • Mitigate threats using Microsoft Sentinel

The subject covers gathering the client’s business and security requirements, selecting appropriate security capabilities, and translating the requirements into architectural specifications that minimize risk, meet compliance and privacy requirements, adhere to best practices, and ensure appropriate levels of confidentiality, integrity, availability, and safety for critical business assets. The focus is on ensuring successful deployments and the ongoing technical viability of solutions through assessments and reviews of the security posture.
On successful completion students should be able to:

  • Design solutions that align with security best practices and priorities
  • Design security operations, identity, and compliance capabilities
  • Design security solutions for infrastructure
  • Design security solutions for applications and data
  • Use AI to optimize Security Operations Centres (SOC)
  • Augment and automate SOC workflows
  • Identify AI threats to Cyber Security
LEVEL
ADVANCED
QUALIFICATION
ICT40120
COURSE DURATION
STUDY WEEKS: 72 HOLIDAYS: 32 TOTAL WEEKS: 104
STATE
ACIT-IFTV
BRANCH
GOLD COAST
SEATS AVAILABLE
30
DOMESTIC FEES
INTERNATIONAL FEES
COE PAYMENT
$200

Apply for Scholarship

International Students
Domestic Students (Australian Residents only)

ENTRY REQUIREMENTS

INTERNATIONAL STUDENTS
Language Proficiency:
Native English or IELTS 6.0
Academic Background:
– Australian Year 12 or equivalent

Course Categories

Enroll now

International Students
Domestic Students (Australian Residents only)

EXPLORE

What past students say about us

Hazel Funa

In the year 2022, I realised that I needed to enhance my skills in the IT field. I researched many international schools that can help me achieve my goal, and I found this school, ACIT, and finally they helped me achieve what I needed to achieve in this field. shout out to the professor for their effort, patience, and sharing their knowledge with me. The staff is very accommodating, and I highly recommend this school.

Keint Lloyd Dumaboc

Currently studying Telco and Network Engineering for almost 8 months now. The school was not only teaching the skills but also giving practical and real world examples that satisfies my expectations from the course.

Shivraj Mavani

One of the most remarkable aspects of ACIT is its commitment to fostering a supportive and inclusive learning environment. The faculty members are not only experts in their fields but also deeply invested in the success and well-being of their students, they go above and beyond to inspire and empower their students.

Top