CYBER MASTERCLASS​​
​
This customised program has been developed in collaboration with Year 11, Computing and Digital Teachers and our Industry Specialist. This program provides a unique opportunity for students to learn from an Industry leader in Cybersecurity.
Workshop 1 - How networking is changing the world.
-
Introduction to the structure and opportunities involved with the Video Game Industry
-
Use the first stages of the Design Thinking methodology
-
State the best industry-standard game engines
-
State several pathways into getting experience in the coding of a computer game
Intended learning outcomes:
-
Introduction to the structure and opportunities involved with the Video Game Industry
-
Use the first stages of the Design Thinking methodology
-
State the best industry-standard game engines
-
State several pathways into getting experience in the coding of a computer game
Workshop 1 - How Networking is changing the world
Types of Networks Used Today
​
Real world Applications
Duration
PAN, LAN, WLAN, CAN, MAN, WAN, VPN
Ecommerce and different models – B2B, B2C, C2C, G2C, P2P
​
Body Area Network in Healthcare domain
​
Near Field Communication – Contactless Payment, Mobile Payment, Electronic Ticket
​
VPN, why are they used, benefits and Challenges
​
Cloud, why are they used, benefits and Challenges
​
5G Technology
60 mins + 15 mins (QA)

This customised program has been developed in collaboration with Year 11, Computing and Digital Teachers and our Industry Specialist.
Workshop 2 - Network Risks and Security
Core Security Principles
Understanding Malware
Duration
Risk, CIA,
DDOS, Social Engineering, Phasing, Vishing, IM, Scareware
​
Vulnerability, Cyberattacks (Passive, Active)
​
Internet of Things
Virus, Worms, Spyware, Ransomware
60 mins + 15 mins (QA)

This program provides a unique opportunity for students to learn from an Industry leader in Cybersecurity.
Getting Into Your System
Trojan, Rootkit, Buffer Overflow, Zero-Day Attack
Internet Security
Secure Website, Cookies, Blocking malicious content on browsers
Encryption
Workshop 3 - Information Ethical and Legal Responsibilities
Ethical Responsibilities
Legal Responsibilities
Duration
What are Ethical Responsibilities?
What are Legal Responsibilities?
60 mins + 15 mins (QA)

The dates and times for the Cyber Masterclass can be negotiated with each school
Concepts of Responsibilities
Data Ownership, Intellectual Property, DRM, Copyrights laws, Privacy Laws
Acts
Overview of Acts
The Copyright Act 1968
The Privacy Act 1988
The Information Privacy Act 2000
Health Records Act 2001
ZAHIR ALI QUETTAWALA
Zahir Ali Quettawala is a strategist, evangelist, and trainer. He is a senior cyber security risk practitioner in Telstra and has spent the past 23 years in the field of information security, audit, risk, governance and compliance.
Zahir is an accredited information security trainer by the Information Systems Audit and Control Association (ISACA). Additionally, he has authored several books, developed curriculums, written professional exam papers and has trained for various institutes, universities and professional organisations for more than 15 years.
