- Type Learning
- Level Foundational
- Time Hours
- Cost Paid
Implement Methods To Protect Data
Issued by
Box Hill Institute
Earners of this badge are able to implement strategies employed to defend an organisation against cyber security attacks and identify techniques to protect personal devices from cyber threats. Mitigation strategies such as the cyber kill chain process, the MITRE ATT&CK in the context of cyber security protection are explained and incident response policies, processes and systems are reviewed. Fundamentals of NIST CSF are examined and explained.
- Type Learning
- Level Foundational
- Time Hours
- Cost Paid
Skills
- Australian Cyber Security Centre (ACSC)
- Centre for Internet Security (CIS)
- Cyber Security Framework (CSF)
- Essential Eight Strategies
- Fundamentals of The National Institute of Standards & Technology (NIST)
- Incident Response Policies
- Mitigation Strategies
- MITRE ATT&CK Framework
- Safeguard Personal Privacy
- Techniques To Protect Devices
- User Authentication Techniques
Earning Criteria
-
Successfully complete the assessment task quiz
-
Completion of formative learning activity -Implement methods to protect private and organisation data