Course format:

Payments options available Learn more
Payments options available More

Cyber Security Engineering: Transform

POWERED BY

Our curriculum is created by Flatiron School – a leading New York based tech education provider.

Go from beginner to job-ready Cyber Security Professional with practical learning, expert mentoring and 1:1 career coaching.

Course overview

What you’ll learn in this course

Learn and practice

Work through five phases of Cyber Security learning material, attend live sessions, and complete practical course activities.

Final project and industry showcase

Complete your final project and present it to a panel of industry experts for feedback.

Career Support Program

Build your job search strategy, create a powerful CV and prepare for interviews.

Build fundamental knowledge of Cyber Security, learning about network security components such as Ethernet and Wi-Fi, and exploring systems security with concepts such as operating systems architecture and system exploits.

  • Understand computer networks
  • Network traffic analysis with Wireshark
  • Build a bash script with Linux OS
  • Symmetric encryption and cracking passwords with open source tools
  •  Python commands, variables, and loops
  •  Governance, risk, and compliance (GRC)
  •  Common regulations and security standards (PCI-DSS, NIST SPs)

Understand military principles of intelligence analysis and the concept of cyber warfare. You’ll cover a range of topics on securing the modern enterprise from outside threats, including governance, risk management and compliance.

  •  Configuring a VyOS router and firewall rules
  •  Windows OS and group policy in Windows Active Directory
  • Asymmetric encryption and algorithms
  • Create custom public and private encryption keys with OpenSSL
  •  Dictionaries and configure logging in Python
  • Cyber threat intelligence and the Maltego OSINT tool

Cover Python and engineering solutions. You’ll use basic coding to create Python scripts and automations, while you’ll also learn how to analyse logs in various network devices.

  •  Web servers and building a LAMP stack
  •  Secure coding
  •  Expose vulnerabilities in a sample application written in C
  •  TOR, Bitcoin, and Blockchain
  •  Exploit OpenSSL using the Heartbleed attack
  •  SIEM tools and Splunk
  •  The Diamond model for a cyber attack

Use your new coding abilities to perform penetration testing, finding vulnerabilities in applications and network security resources.

  •  Web application firewalls
  •  Create custom network packets using Scapy
  •  Monitor network traffic with tcpdump
  •  Buffer overflows and conducting a buffer overflow attack
  •  Vulnerability scanning with Nessus
  •  SIEM tool architecture and data analysis in Splunk
  •  Risk management and the risk register
  •  Build a risk register for a healthcare organisation

To protect your data in the event of a breach, you’ll apply cryptography practices hands-on, by configuring a web server with SSL/TLS, interfacing with Certificate Authorities, issuing certificates, and securely configuring SSH.

  •  Cloud computing, common cloud threats, and conducting a network audit
  •  System hardening and configuring network devices to harden them against attack
  •  Exploits and leveraging Kali Linux to conduct an attack
  •  Monitoring with SIEM tools and configuring additional monitoring with Splunk

Complete your final scenario project to bring together all your learning. Present your project to a panel of industry experts for specialist feedback, and get the chance to network with established Cyber Security Professionals.

Why study Cyber Security Engineering at Academy Xi?

  • Mentoring & support
  • Practical experience
  • Community connection
JOB OUTCOMES REPORT

97% job placement success!

This report includes outcomes data for the 136 students who chose to actively participate in our career support program. 132 of the 136 active participants successfully landed roles, giving the program a success rate of 97%.

Fees & payment options

We offer a range of flexible payment options so you can achieve your goals today, and pay at your own pace.

No deposit

Study Now, Pay Later

Choose weekly, fortnightly or monthly repayments over a repayment term of up to 36 months, with no deposit and 100% interest-free.

PAYMENTS

From $55 /week

10% DISCOUNT

Pay upfront

Pay for your course upfront to receive a 10% discount on the full amount, and be eligible for any additional special offers.

TOTAL COST OF COURSE

$14,500

Interest-free payment plan

Payment Assist

Convenient payment plans that break up your course repayments into smaller chunks, 100% interest-free.

INSTALMENTS

From $100 /week

Frequently asked questions on Cyber Security

Frequently asked questions

Cyber Security is the practice of protecting electronic information from unauthorised access or theft. As the world increasingly relies on technology, Cyber Security has become a top priority for businesses and individuals. There are many types of cyber threats, including viruses, malware, phishing scams, and hacking. To protect against these threats, Cyber Security Professionals implement countermeasures that eliminate, or at least drastically reduce the risk of cyber attacks. In a world where more and more businesses and individuals are relying on digital information, Cyber Security has become an essential part of keeping data safe.

With the rapid evolution of technology and the internet, the need for Cyber Security is more important than ever before. In Australia, there is a current shortage of Cyber Security Professionals, with a forecasted 30,000 additional Cyber Security workers needed by 2026 (CyberCX, 2022).

Studying with Academy Xi means you can pick up practical tools and technical capabilities needed to launch your career as a Cyber Security Professional, all online. Learning online gives you the freedom to choose when and where you learn, and is designed to support your work-life balance.

Over 1,450 Cyber Security jobs are currently available in Australia (Seek, 2022). The types of roles you can expect to land once trained in Cyber Security include, but are not limited to:

  • Cyber Security Engineer 
  • Cyber Security Analyst 
  • Cyber Security Consultant 
  • Cyber Security Penetration Tester

This course has the following minimum computing requirements:

  • OPERATING SYSTEMS:
  • Laptop running the latest version of either Windows or Linux
  • Apple computers are not suitable for this course
  •  
  • PROCESSOR: 2GHz+
  • MEMORY: 16GB+ of RAM
  • HARD DRIVE: 500GB+ of free hard drive space
  • HARDWARE: A working keyboard, trackpad/mouse, and display
  • ADMINISTRATIVE ACCESS: Required
  • INTERNET ACCESS: Required
  • WEBCAM: Required

In this course you’ll experience our ‘flipped classroom’ style of learning, where students cover course content independently before coming together to discuss concepts, ask questions and collaborate with mentor support. You’ll learn through a combination of:

  • Readings
  • Pre-recorded videos
  • Regular live sessions with your mentor and peers
  • 1:1 sessions with your mentor
  • Hands-on activities and practical project work
  • Q&A via chat and discussion boards

Be inspired by our student success stories

4.6 star rating on Google

Harold Torres Marino

Studied Software Engineering

When Harold started the Software Engineering: Transform course, his only coding experience was a high school science project. Before graduation, he’d been hired as a Software Engineer. Read about Harold’s Academy Xi journey, which took him from novice to professional specialist in less than a year.

Harold Torres Marino, Studied Software Engineering

Barry Nguyen

Studied Software Engineering

Startup Founder, Entrepreneur, Advisor — and now Physiotherapist turned Software Engineer — Barry Nguyen proves that curiosity, passion and continuous learning can help you get ahead of the curve.

Barry Nguyen, Studied Software Engineering

Jocelyn Fisher

Studied Data Analytics

With a passion for problem solving and an eye for detail, Jocelyn is a perfect match for a career in Data Analytics. Find out how the Data Analytics: Transform has helped Jocelyn go from complete beginner to industry-ready in just 15 weeks.

Jocelyn Fisher, Studied Data Analytics

Get the complete course guide

Our in-depth course guide has all the information you need.

Have any unanswered questions?

One of our in-house course advisors will get in touch with you directly.

Download course guides

Get detailed information on what to expect from our online courses