Topics
How do experts know the security risks they face in digital systems?
Modelling Cyber Threats
In this course, students will learn from cyber security professionals about:
- how modelling tools are used to identify system threats
- the risks that these threats pose
- the goals of cyber security
- the numerous threats posed by attackers and hackers
- how threats are prioritised
- how mitigation strategies are used to lower the risk
Australian Curriculum v9 Content Descriptions
This course is designed to support your lesson planning. While comprehensive, individual resources may not cover every aspect of a content description. We recommend reviewing each resource to determine how it best fits your teaching objectives.
What's Next?
Finished this course? Check out : Monitoring & Securing Networks or Cyber.Comp
Your current score is: 0 points.
| Module | Progress | ||
|---|---|---|---|
| 1. |
|
Understanding cyber threats | |
| 2. |
|
Modelling cyber threats | |
| 3. |
|
Mitigating cyber threats and risk analysis | |
| 1. |
|
Understanding cyber threats |
| 2. |
|
Modelling cyber threats |
| 3. |
|
Mitigating cyber threats and risk analysis |
| 1. |
|
Understanding cyber threats |
| 2. |
|
Modelling cyber threats |
| 3. |
|
Mitigating cyber threats and risk analysis |