
Cybersecurity Taskforce Webinar Session 27 July 2020
Standards Australia has joined with the NSW Government, AustCyber and industry to establish a new taskforce to improve the practice of cybersecurity across Australian industry.

Standards Australia has joined with the NSW Government, AustCyber and industry to establish a new taskforce to improve the practice of cybersecurity across Australian industry.

The Linux Application and Configuration (CLAC) course provides students an understanding of Linux operating systems, commands, and capabilities. Students will work with real Linux systems in real environments and will leverage commands, applications, and toolsets to complete tasks in a cybersecurity environment.

This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level. Example proof-of-concept solutions with measured network, device, and operational performance impacts for a process-based manufacturing environment (Volume 2) and a discrete-based manufacturing environment (Volume 3) are included in the guide.

This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level. Example proof-of-concept solutions with measured network, device, and operational performance impacts for a process-based manufacturing environment (Volume 2) and a discrete-based manufacturing environment (Volume 3) are included in the guide.

This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level. Example proof-of-concept solutions with measured network, device, and operational performance impacts for a process-based manufacturing environment (Volume 2) and a discrete-based manufacturing environment (Volume 3) are included in the guide.

The Network Application and Configuration (CNAC) course provides students a fundamental understanding of how to establish, enhance, and enable organizational networks. Students will work with real networks in real environments and will leverage real tools, techniques, and skills to complete tasks in a cybersecurity environment.

The CSX Threat Hunting Course provides students an in-depth, hands-on, technical training experience wherein they become cybersecurity threat hunters by dealing with real world vulnerabilities, exploitations, and attacks. The course, which covers advanced technical topics ranging from exploitation and threat creation to covert communications hack response, ensures that students are tactically trained and ready to hunt down today’s threat actors in live environments.

The CSX Cybersecurity Practitioner Certification Training provides students with informative lessons and in-depth, skills-based labs to hone their technical cybersecurity skills. Upon completion of each lab, students are provided a detailed analytic report, identifying student strengths and weaknesses.

A must-have, hands-on guide for working in the cybersecurity profession. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration.
Thomas J. Mowbray: ISBN: 978-1-118-69704-7 October 2013 360 Pages

In 2024, the cybersecurity landscape was marked by a dramatic surge in threats, driven by sophisticated tactics and emerging technologies. Infostealer malware led to significant breaches, such as the Snowflake