CM hero.jpg

CYBER MASTERCLASS

cyber3.jpg

This customised program has been developed in collaboration with Year 11, Computing and Digital Teachers and our Industry Specialist. This program provides a unique opportunity for students to learn from an Industry leader in Cybersecurity.

hack1.jpg

Workshop 1 - How networking is changing the world.
 

  • Introduction to the structure and opportunities involved with the Video Game Industry

  • Use the first stages of the Design Thinking methodology

  • State the best industry-standard game engines

  • State several pathways into getting experience in the coding of a computer game

gamer girl.jpg

Intended learning outcomes:

  • Introduction to the structure and opportunities involved with the Video Game Industry

  • Use the first stages of the Design Thinking methodology

  • State the best industry-standard game engines

  • State several pathways into getting experience in the coding of a computer game

Workshop 1 - How Networking is changing the world

Types of Networks Used Today

Real world Applications

Duration

PAN, LAN, WLAN, CAN, MAN, WAN, VPN

Ecommerce and different models – B2B, B2C, C2C, G2C, P2P

Body Area Network in Healthcare domain

Near Field Communication – Contactless Payment, Mobile Payment, Electronic Ticket

VPN, why are they used, benefits and Challenges

Cloud, why are they used, benefits and Challenges

5G Technology

60 mins + 15 mins (QA)

This customised program has been developed in collaboration with Year 11, Computing and Digital Teachers and our Industry Specialist.

Workshop 2 - Network Risks and Security

Core Security Principles

Understanding Malware

Duration

Risk, CIA,

 

DDOS, Social Engineering, Phasing, Vishing, IM, Scareware

Vulnerability, Cyberattacks (Passive, Active)

Internet of Things

Virus, Worms, Spyware, Ransomware

60 mins + 15 mins (QA)

This program provides a unique opportunity for students to learn from an Industry leader in Cybersecurity.

Getting Into Your System

Trojan, Rootkit, Buffer Overflow, Zero-Day Attack

Internet Security

Secure Website, Cookies, Blocking malicious content on browsers

 

Encryption

Workshop 3 - Information Ethical and Legal Responsibilities

Ethical Responsibilities

Legal Responsibilities

Duration

What are Ethical Responsibilities?

What are Legal Responsibilities?

60 mins + 15 mins (QA)

The dates and times for the Cyber Masterclass can be negotiated with each school

Concepts of Responsibilities

Data Ownership, Intellectual Property, DRM, Copyrights laws, Privacy Laws

Acts

Overview of Acts

The Copyright Act 1968

The Privacy Act 1988

The Information Privacy Act 2000

Health Records Act 2001

CM i.jpg

ZAHIR ALI QUETTAWALA

Zahir Ali Quettawala is a strategist, evangelist, and trainer. He is a senior cyber security risk practitioner in Telstra and has spent the past 23 years in the field of information security, audit, risk, governance and compliance.

 

Zahir is an accredited information security trainer by the Information Systems Audit and Control Association (ISACA). Additionally, he has authored several books, developed curriculums, written professional exam papers and has trained for various institutes, universities and professional organisations for more than 15 years.

Wyndham Tech School
Victoria University
Werribee Campus
Building 14, Gate 2
via Hoppers Lane, Werribee
wyndham.tech@vu.edu.au
+61 3 9919 1996
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube