Meeting a growing global demand for cyber security professionals
As the first TAFE in WA to open a Cyber Security Training Centre, we are skilling Western Australians to take on jobs in the growing cyber security industry.
We collaborate with ECU, AustCyber, City of Joondalup and WA Police Force – all located in the Joondalup Innovation Hub – which is set to become one of the world’s leading centres in the fight against cyber crime.
Our cyber security courses focus on the practical and theoretical dimensions of IT security across a range of fundamental areas, such as network security and vulnerability assessment, information security, digital forensics, wireless device security and database security.
North Metropolitan TAFE’s authorised status with the Microsoft Imagine Academy, Cisco Networking Academy and Red Hat Learning Academy means that our students benefit from extra technical skills and certifications to improve their employment prospects.
Our expertise
Collectively, our cyber security training team has over 100 years’ teaching experience in IT related fields from Certificate II to postgraduate level; 40 years in the network and security-related industries; 30 years in software and web development; and 25 years in IT management.
Our lecturers keep up-to-date with industry relevant qualifications and professional development including being both Cisco Certified Instructors and Microsoft Certified Instructors for security related courses, and Red Hat Instructors for Enterprise Linux Security courses.
Our facilities
Joondalup (Kendrew) campus | Cyber Security Training Centre
The new $356,000 Cyber Security Training Centre includes a hackers den, defence hub and control centre.
Students will learn how to: implement appropriate software; use a range of tools and procedures to mitigate cyber security threats; protect an organisation from insider security breaches; and develop systems to minimise network vulnerabilities and risks.
Essential Eight Training Program
As part of the Australian Cyber Security Centre’s (ACSC) commitment to providing guidance and support to industry and government in strengthening their cyber security posture, ACSC has released a series of tools and resources related to the Essential Eight:
- Cyber Toolbox.
- Essential Eight Assessment Process Guide.
- Essential Eight Assessment Report Template.
- Essential Eight Implementation Guidance.
The Essential Eight Assessment course is an Australian Signals Directorate (ASD)-developed training course that is designed to provide individuals with the understanding of how to perform an assessment of an organisation’s maturity against the Essential Eight Maturity Model.
To find out more see Essential Eight Training Program.
What our clients say
“I am delighted to partner with leading edge training organisations such as North Metro TAFE as they work to build a strong pipeline of locally skilled cyber security professionals. They demonstrate a clear commitment of support to the development of a vibrant and globally competitive WA cyber sector.”
Dr Ian Martinus
WA AustCyber Node
For these jobs, what course should I do?
Job titles
- ICT customer support
- ICT help desk officer/technician
- System support officer
Responsibilities
ICT Customer Support Officers provide support, education and guidance in the deployment and maintenance of computer infrastructure and the diagnosis and resolution of technical problems and issues.
Job titles
- Website | Network security officer
- ICT security specialist/consultant
- Penetration tester
- Cyber security intrusion tester
Responsibilities
Perform penetration tests on computer systems, networks and applications. Create new testing methods to identify vulnerabilities. Perform physical security assessments of systems, servers and other network devices to identify areas that require physical protection.
Job titles
- Security systems help desk support
- Information systems security officer
- Cyber security/Network operations centre officer
Responsibilities
Provide support, education and guidance in the deployment and maintenance of computer infrastructure and the diagnosis and resolution of technical problems and issues. Maintain the computer systems and networks, update and install new software and equipment and provide training to other staff members.
Job titles
- Audit collection officer
- Incident response team member
- Information security officer
- IT security consultant
- Integration analyst
Responsibilities
Ensuring data security, oversee implementing effective technology solutions that prevent internal and external malicious users from compromising data integrity, assess software, computer systems, and networks for vulnerabilities, design and implement the best security solutions for an organisation's needs. They play the role of both the attacker and the victim and are asked to locate and potentially exploit vulnerabilities.
Job titles
- IT/hardware technician
- User support specialist
- Network audit officer
- Operations team member
Responsibilities
Support and maintain computer systems and peripherals by installing, configuring, testing, troubleshooting, and repairing hardware.
Job titles
- Computer technical support security
- Information security
- Network audit officer
- Security systems support
Responsibilities
Maintain company computer systems, installs, and configures hardware and software, and solves technical issues as they arise.
Perform penetration tests on computer systems, networks and applications. Create new testing methods to identify vulnerabilities. Perform physical security assessments of systems, servers and other network devices to identify areas that require physical protection.
Instituting security protocols, fending off attacks, and running diagnostics. Monitor networks and create a risk management plans. Building firewalls, performing risk assessments, and performing security updates.