Updating Results

Non-Accredited Training Essential Eight Training

  • Non-Award

The Essential Eight Assessment Course has been designed by the Australian Signals Directorate's Australian Cyber Security Centre (ACSC) and is delivered in partnership by TAFEcyber.

Key details

Degree Type
Non-Award
Study Mode
In person
Domestic Fees
$2,000 total

About this course

The Essential Eight Assessment Course has been designed by the Australian Signals Directorate's Australian Cyber Security Centre (ACSC) and is delivered in partnership by TAFEcyber.

This course uses a blend of specialist knowledge, experience and hands-on technical training to enable cyber security and ICT professionals to understand the ACSC's Essential Eight Assessment Guidance Package and the Essential Eight Maturity Model. These skills and knowledge will enable participants to effectively assess and improve their organisation's cyber security posture.

You will learn the intent and application of ASCS's Essential Eight mitigation strategies, how to use ASCS-designed tools, how to accurately test the implementation of the Essential Eight security controls and how to develop an accurate actionable assessment report. You will receive a certificate upon successfully passing the exam.



Entry requirements

  • You must have a minimum of a Certificate IV qualification in a technical ICT discipline and two (2) years' experience in a technical ICT role OR a minimum four (4) years' experience in a technical ICT role.
  • You must be an Australian Citizen or Permanent Resident. Applicants will be vetted to ensure they meet the entry requirements, including verification of their background and experience.

Study locations

Reid

Career pathways

Upon completion of the Essential Eight Assessment Course, participants will be equipped to accurately assess their organisation's implementation of the Essential Eight security controls using the Essential Eight Assessment Guidance Package and the Essential Eight Maturity Model. In turn, participants will understand how to develop actionable steps in order to improve their organisation's cyber security posture.