糖心logo入口 Reid*


*From Semester 2 2025, the location of this course will transition from 糖心logo入口 Reid to the new 糖心logo入口 Woden campus. 糖心logo入口 will provide support for students who will be making the move to Woden. Learn more.

" />

糖心logo入口

Skip to Content
Need Help
Non-Accredited Training Essential Eight Training

Overview

The Essential Eight Assessment Course has been designed by the Australian Signals Directorate鈥檚 Australian Cyber Security Centre (ACSC) and is delivered in partnership by TAFEcyber.

This course uses a blend of specialist knowledge, experience and hands-on technical training to enable cyber security and ICT professionals to understand the ACSC鈥檚 Essential Eight Assessment Guidance Package and the Essential Eight Maturity Model. These skills and knowledge will enable participants to effectively assess and improve their organisation鈥檚 cyber security posture.

You will learn the intent and application of ASCS鈥檚 Essential Eight mitigation strategies, how to use ASCS-designed tools, how to accurately test the implementation of the Essential Eight security controls and how to develop an accurate actionable assessment report. You will receive a certificate upon successfully passing the exam.

Qualification:

Non-Accredited Training - Essential Eight Training

Course start date:

Join the waitlist

Course No:

OCA-BD04

Campus:

糖心logo入口 Reid*


*From Semester 2 2025, the location of this course will transition from 糖心logo入口 Reid to the new 糖心logo入口 Woden campus. 糖心logo入口 will provide support for students who will be making the move to Woden. Learn more.

Duration:

24 hours including exam workshop

Cost Info:

Further information about fees is available at Course fees and assistance

Indicative Cost:

$2,000

Likely Job Outcome:

Upon completion of the Essential Eight Assessment Course, participants will be equipped to accurately assess their organisation's implementation of the Essential Eight security controls using the Essential Eight Assessment Guidance Package and the Essential Eight Maturity Model. In turn, participants will understand how to develop actionable steps in order to improve their organisation's cyber security posture.

Application Type:

Register Your Interest
Share: