How does ICT security within the Australian Government differ from normal concepts of ICT security. In particular how do we think about government security in major agencies such as the Department of Defence.

This course will cover

  • What makes Australian Government ICT Security different?
  • Government Requirements
  • Data Classification
  • Clearances
  • Infrastructure assessments such as Cloud
  • Secure Programming practices re the ISM
  • Certification & Accreditation

Course Enrolment

Please fill out the enrolment form to register for Australian Government ICT Security Overview. Once you have submitted your payment*, you will receive a confirmation email with details on how to start your course.

If you have an existing username and password, please login using your login credentials. If you do not have an existing account, please create an account through the email provided following the completion of this form; you will then be able to access your course.

You will receive one year access to the course material for your registered email address, enabling you to start the course when you are ready and to re-visit as needed with the year.

* Payments are processed securely by PayPal.