{"id":133248,"date":"2021-06-11T11:23:28","date_gmt":"2021-06-11T03:23:28","guid":{"rendered":"https:\/\/www.curtin.edu.au\/study\/?post_type=pd&#038;p=133248"},"modified":"2021-07-27T09:42:31","modified_gmt":"2021-07-27T01:42:31","slug":"think-like-a-hacker-cybersecurity-awareness","status":"publish","type":"pd","link":"https:\/\/www.curtin.edu.au\/study\/prof-development\/think-like-a-hacker-cybersecurity-awareness\/","title":{"rendered":"Think like a hacker: Cybersecurity awareness"},"content":{"rendered":"\n<p>Cybersecurity is a top global concern, with 61 per cent of firms across the US and Europe reporting a cyber incident in the past year*. While this is worrying, there are many steps you can take to protect your devices, data and networks.<\/p>\n\n\n\n<p>In this one-day masterclass, you\u2019ll put yourself in the shoes of a hacker and discover the phases of a successful cyber attack. You\u2019ll learn to counter attacks through learning the fundamentals of cybersecurity management and different ways to shield your business.<\/p>\n\n\n\n<p><sub>*The Hiscock Cyber Readiness Report 2019<\/sub><\/p>\n\n\n<mimas-block \n        block-name=\"accordion\"\n        role=\"complementary\"\n        aria-label=\"Accordion content\"\n        data-segment=\"all\">\n\n                \n\n                    <div class=\"accordion\" aria-labelledby=\"accordion-title-Key-takeaways\">\n            <button type=\"button\" class=\"accordion__heading\" aria-controls=\"Key-takeaways\" aria-expanded=\"false\">\n            <div class=\"title\" id=\"accordion-title-Key-takeaways\">Key takeaways<\/div>\n            <div class=\"icon\"><\/div>\n        <\/button>\n        <div class=\"accordion__content\" id=\"Key-takeaways\" aria-hidden=\"true\">\n                    <p>This interactive masterclass includes demonstrations of real cyber attacks including credential stealing (phishing) and wi-fi eavesdropping. Each demonstration is followed by a debrief to discuss lessons learned and defences that can be used to counter the attack.<\/p>\n<p>Content includes:<\/p>\n<ul>\n<li>Fundamentals of cybersecurity management<\/li>\n<li>Confidentiality, integrity and availability<\/li>\n<li>Best practices on measuring and assessing security<\/li>\n<li>Cyber attacks \u2013 social media and phishing<\/li>\n<li>Secure communications.<\/li>\n<\/ul>\n\n        \n                            \n                    <\/div>\n<\/div>\n                    <div class=\"accordion\" aria-labelledby=\"accordion-title-Who-is-this-program-for?\">\n            <button type=\"button\" class=\"accordion__heading\" aria-controls=\"Who-is-this-program-for?\" aria-expanded=\"false\">\n            <div class=\"title\" id=\"accordion-title-Who-is-this-program-for?\">Who is this program for?<\/div>\n            <div class=\"icon\"><\/div>\n        <\/button>\n        <div class=\"accordion__content\" id=\"Who-is-this-program-for?\" aria-hidden=\"true\">\n                    <p>The masterclass is suitable for general management staff across a range of organisations that are interested in learning the fundamentals of cybersecurity management and protecting information. Background knowledge is not required.<\/p>\n\n        \n                            \n                    <\/div>\n<\/div>\n                    <div class=\"accordion\" aria-labelledby=\"accordion-title-Program-schedule\">\n            <button type=\"button\" class=\"accordion__heading\" aria-controls=\"Program-schedule\" aria-expanded=\"false\">\n            <div class=\"title\" id=\"accordion-title-Program-schedule\">Program schedule<\/div>\n            <div class=\"icon\"><\/div>\n        <\/button>\n        <div class=\"accordion__content\" id=\"Program-schedule\" aria-hidden=\"true\">\n                    <table id=\"tablepress-226\" class=\"tablepress tablepress-id-226\">\n<thead>\n<tr class=\"row-1\">\n<th class=\"column-1\">Time<\/th>\n<th class=\"column-2\">Title<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr class=\"row-2\">\n<td class=\"column-1\">9:00am \u2013 10:30am<\/td>\n<td class=\"column-2\">Fundamentals of security<\/td>\n<\/tr>\n<tr class=\"row-3\">\n<td class=\"column-1\">10:30am \u2013 11:00am<\/td>\n<td class=\"column-2\">Morning tea<\/td>\n<\/tr>\n<tr class=\"row-4\">\n<td class=\"column-1\">11:00am \u2013 12:30pm<\/td>\n<td class=\"column-2\">Measuring and assessing security<\/td>\n<\/tr>\n<tr class=\"row-5\">\n<td class=\"column-1\">12:30pm \u2013 1:15pm<\/td>\n<td class=\"column-2\">Lunch<\/td>\n<\/tr>\n<tr class=\"row-6\">\n<td class=\"column-1\">1:15pm \u2013 2:30pm<\/td>\n<td class=\"column-2\">Cyber attacks \u2013 social media and phishing<\/td>\n<\/tr>\n<tr class=\"row-7\">\n<td class=\"column-1\">2:30pm \u2013 3:00pm<\/td>\n<td class=\"column-2\">Afternoon tea<\/td>\n<\/tr>\n<tr class=\"row-8\">\n<td class=\"column-1\">3:00pm \u2013 4:30pm<\/td>\n<td class=\"column-2\">Secure communications and wrap up.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n        \n                            \n                    <\/div>\n<\/div>\n        \n<\/mimas-block>","protected":false},"excerpt":{"rendered":"<p>In this one-day masterclass, you\u2019ll put yourself in the shoes of a hacker and discover the phases of a successful cyberattack. You\u2019ll learn to counter attacks though learning fundamentals of cybersecurity management and different ways to shield your business.<\/p>\n","protected":false},"parent":0,"menu_order":14,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","wds_primary_pd-categories":0,"footnotes":""},"pd-categories":[57,59],"class_list":["post-133248","pd","type-pd","status-publish","hentry","pd-categories-cbs-masterclasses","pd-categories-previous-masterclasses"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.curtin.edu.au\/study\/wp-json\/wp\/v2\/pd\/133248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.curtin.edu.au\/study\/wp-json\/wp\/v2\/pd"}],"about":[{"href":"https:\/\/www.curtin.edu.au\/study\/wp-json\/wp\/v2\/types\/pd"}],"version-history":[{"count":5,"href":"https:\/\/www.curtin.edu.au\/study\/wp-json\/wp\/v2\/pd\/133248\/revisions"}],"predecessor-version":[{"id":134975,"href":"https:\/\/www.curtin.edu.au\/study\/wp-json\/wp\/v2\/pd\/133248\/revisions\/134975"}],"wp:attachment":[{"href":"https:\/\/www.curtin.edu.au\/study\/wp-json\/wp\/v2\/media?parent=133248"}],"wp:term":[{"taxonomy":"pd-categories","embeddable":true,"href":"https:\/\/www.curtin.edu.au\/study\/wp-json\/wp\/v2\/pd-categories?post=133248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}