Support Apply Now Contact Us
indvidual-course
Information Technology

ICT50220-Diploma of Information Technology(Cyber Security)

Overview

This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function. Individuals in these roles carry out moderately complex tasks in specialist fields, working independently, as part of a team or leading deliverables with others. They may apply their skills across a wide range of industries, business functions and departments, or as a business owner (sole trader/contractor). The skills required for these roles may include, but are not restricted to;

  • Advanced Networking: configuring and managing virtual computing environments, and security within ICT networks.
  • Advanced Programming: applying intermediate and advanced programming skills, managing data, and building advanced user interfaces to manage organisational requirements.
  • Advanced Programming: applying intermediate and advanced programming skills, managing data, and building advanced user interfaces to manage organisational requirements.
  • Back-end Web Development: developing and maintaining website information architecture and data.
  • Business Analysis: designing and implementing technical requirements, quality assurance processes and contingency plans for businesses.
  • Cloud Architecture: developing, improving, and designing cloud infrastructure, including disaster recovery plans.
  • Cloud Engineering: building, implementing, and managing cloud infrastructure and virtual networks.
  • Cyber Security: protecting sensitive data and information through security architecture and developing disaster recovery and contingency plans.
  • Database and Data Management: creating, designing, and monitoring systems that store data and optimise organisational knowledge management.
  • Front end Web Development: designing dynamic and complex websites, user experience solutions and documents using extensible mark-up languages.
  • Game Art and Design: creating complex 2D and 3D modelling and animation software through scripts and storyboards.
  • Game Programming: creating complex 2D and 3D interactive games and media, building graphical user interfaces and applying artificial intelligence in game development.
  • Systems Administration: reviewing maintenance procedures and support to help troubleshoot system applications.
  • Systems Analysis: modelling and testing data objects, data processes and preferred ICT system solutions.
Campus Location Sydney
Applicant Domestic | International
Course Duration 52 weeks, including 40 study weeks and 12 weeks of holidays.
CRICOS Course Code 112212A

Who should apply for this course and why

This course is targeted at international students who are:

Seeking to pursue a career in information technology.
Seeking a pathway to higher-level qualifications
Seeking to enter a new industry sector.

Completing this course may provide you with employment or learning opportunities. Potential employment options are in a range of IT related roles. Further education pathways may include ICT60120 Advanced Diploma of Information Technology or a range of advanced diploma qualifications in information and communications technology (ICT).

How will you learn

Your learning experiences are designed to best suit the learning outcomes of the courses you choose

Lectures
Projects
Computer LAb
Assessments
indvidual-course

Career Opportunities

Completing the ICT50220 Diploma of Information Technology (Cyber Security) opens up a variety of career opportunities in the rapidly growing field of cybersecurity. Here are some potential career paths:

  • Cybersecurity Analyst: Analyze and assess potential security threats and vulnerabilities, develop strategies to mitigate risks, and implement security measures to protect an organization's systems and data.
  • Security Consultant: Provide expert advice on cybersecurity strategies, assess clients' security postures, and recommend solutions to enhance their cybersecurity defenses.
  • Network Security Engineer: Design, implement, and maintain secure network infrastructure, including firewalls, VPNs, and intrusion detection systems, to protect against cyber threats.
  • Penetration Tester/Ethical Hacker: Conduct simulated cyber-attacks to identify weaknesses in an organization's security infrastructure, helping to strengthen defenses against real-world threats.
  • Security Auditor: Conduct audits and assessments of organizational security practices and policies to ensure compliance with regulatory requirements and industry standards.
  • Incident Responder: Respond to cybersecurity incidents such as data breaches or malware infections, investigate the root causes, and implement measures to contain and remediate the damage.
  • Security Operations Center (SOC) Analyst: Monitor network traffic and security alerts in real-time, investigate potential security incidents, and coordinate response efforts to mitigate threats.
  • Security Administrator: Manage and administer security technologies such as antivirus software, authentication systems, and encryption tools to protect systems and data.
  • Cryptographer: Develop and implement cryptographic algorithms and protocols to secure data transmissions and protect sensitive information from unauthorized access.
  • Cybersecurity Trainer/Instructor: Share your expertise by training individuals or organizations on cybersecurity best practices, techniques, and tools.

These are just a few examples, and the field of cybersecurity offers a wide range of career paths with opportunities for specialization and advancement. Additionally, as cyber threats continue to evolve, the demand for skilled cybersecurity professionals is expected to remain high, making it a rewarding and dynamic field to pursue.

Course Detail

Course Structure

This course is delivered face-to-face in a classroom-based setting, as well as through structured self-study. All classroom-based training will take place at the Australian National Education.
The timetable for this course will be advised in your Offer Letter and Student Agreement.
You are required to attend classes for 14 hours per week, as well as complete 6 hours of structured self-study per week for 40 study weeks (4 terms of 10 weeks each). Holiday breaks are as indicated in your timetable.
Class sessions include a mix of theory and practical activities with a focus on creating a real-life workplace.
In addition to classroom based learning and structured self-study, you will also need to complete approximately 5 hours of additional, unsupervised study per week including general reading and research for assessments

Core Units
Requirement ICT50220 Diploma of Information Technology (Cyber Security) requires the successful completion of Six (6) core units
Core Subjects Title
BSBCRT512 Originate and develop concepts
BSBXCS402 Promote workplace cyber security awareness and best practices
BSBXTW401 Lead and facilitate a team
ICTICT517 Match ICT needs with the strategic direction of the organisation
ICTICT532 Apply IP, ethics and privacy policies in ICT environments
ICTSAS527 Manage client problems
Elective Units
Requirement ICT50220 Diploma of Information Technology (Cyber Security) requires the successful completion of Fourteen (14) elective units
Elective Subjects Title
ICTNWK529 Install and manage complex ICT networks - Group A Elective
ICTNWK536 Plan, implement and test enterprise communication solutions - Group A Elective
ICTNWK540 Manage network security - Group A Elective
ICTNWK546 Manage network security - Group A Elective
ICTSAD507 Design and implement quality assurance processes for business solutions - Group D Elective
ICTSAD508 Develop technical requirements for business solutions - Group D Elective
ICTCYS407 Gather analyse and interpret threat data - Group G Elective
ICTCYS610 Protect critical infrastructure for organisations - Group G Elective
ICTCYS613 Utilise design methodologies for security architecture - Group G Elective
ICTSAS524 Develop, implement and evaluate an incident response plan - Group G Elective
ICTSAS526 Review and update disaster recovery and contingency plans - Group G Elective
ICTICT523 Gather data to identify business requirements - Group O Elective
ICTICT526 Verify client business requirements - Group O Elective
ICTWEB452 Create a mark-up language document - Group O Elective
****NOTE****

Twenty (20) units including six (6) core units and fourteen (14) elective units are required for the award of the ICT50220 Diploma of Information Technology.

The 20 units that must be completed include:
* 6 core unitsbr * 14 elective units of which:
* at least 10 units must be selected from the elective units listed at the link below
* up to 4 units may be selected from the remaining listed elective units at the link below or from this or any currently endorsed Training Package or accredited course where the units are packaged in an Australian Qualification Framework (AQF) Level 4, 5 or 6 qualification.
Units have been selected in accordance with the packaging rules and are relevant to the work outcome, local industry requirements and qualification level.

Course Duration

This qualification will be delivered over 52 weeks, including 40 weeks of training and assessment spread over 4 terms of 10 weeks each and 12 weeks of holidays.

Course Progress and Attendance

Please note that as international students, in order to meet your visa requirements, you are required to satisfactorily complete your course progress and class attendance’s requirements. For further information, please refer to International Student Handbook that also includes information on specific supports available for international students.

course-progress

Entry Requirements

Before you begin your application to study as a domestic student, check that you meet the requirements listed below.

Must be at least 18 years of age and have completed the equivalent of Year 12
Must participate in a course entry interview to determine suitability for the course, and student needs
Must have at least one of the following:
  • IELTS* score of 6.0 (test results must not be more than 2 years old)
  • Educated for 5 years in an English-speaking country
  • Successful completion of an English Placement Test (e.g. ANE College's LLN)

Note that other English language tests such as PTE and TOEFL can be accepted. You are required to provide your results so that we can confirm they are equivalent to IELTS 6.0.

Fee & Scholarship

Course Fees

The costs for this course are as follows:

Tuition fees: $15,000 AUD
Enrolment fee: $250 AUD
Material fee: $1500 AUD
Non Tuition Fees

May apply and can be found in our International Student Handbook on our website at www.ane.edu.au

Course Title

ICT50220-Diploma of Information Technology(Cyber Security)

CRICOS Code

03859B

Start Year

2024

How Can I Apply

To apply for this course, you are required to complete an enrolment form and submit all required supporting evidence including:

  • a copy of your High School Certificate
  • proof of English language proficiency as specified in the entry requirements.
Where to From Here?
  • If your application is successful, we will send you an Offer Letter and Student Agreement. You should make sure you read through this document carefully to make sure you are happy with all of the terms and conditions.
  • If you are, then simply sign the document and send it back to us at sydney.campus@ane.edu.au
  • Once we receive this, we will issue you with a Confirmation of Enrolment (CoE) letter and an invoice for the first payment.
  • The first day of each course will include orientation and induction. Orientation will include information about the campus, living in Australia, accessing our support services and methods for achieving success throughout the course, including course progress requirements.
  • This course outline should be read in conjunction with Australian National Education’s International Student Handbook. This can be found online at www.ane.edu.au/.
find-out

Want to find out more?

Don't forget to download the course guide or get in touch with us below.

Related Course