Study Method Online
Institution Australian College of Business Intelligence
Start Date Enrol anytime

Course overview

People studying this course are concerned by cyber security risks associated with the increased use of existing and emerging AI technologies by employees. In particular, they are concerned with the growing use of off-the-shelf generative AI technologies, such as ChatGPT and Google Gemini. They want to learn what the risks of generative AI are and how they can empower their organisations to manage them.

Who's It For?

This short course is for non-ICT professionals who wish to boost their foundational knowledge of cyber security. These professionals work for small-medium Australian companies; business that often lack large and sophisticated IT departments or may not even have their own IT team.

The people undertaking this short course are likely to be managers or business owners.

Study method

  • Online Online info icon
    Online delivery - online course content with the exception of assessments and work placement
  • Blended Blended info icon
    Blended delivery - both online course content and partial face to face requirements
  • In-class In-class info icon
    In class delivery - predominately face to face course content conducted at a specific location
  • Virtual Virtual info icon
    Virtual Delivery - Live and interactive classroom-style learning conducted completely online

Duration study load

  • 10+ Online Learning Hours, plus a 2 hour interactive online session with the trainer
  • For students who opt to complete the full BSBXCS402 – Promote workplace cyber security awareness and best practices the total learning hours are 100+ in total
  • Students will have access to the course for 3 months to access the online content and to complete the assessment if desired

Delivery

  • 100% online, self-paced study

Entry requirements

For the short course content there are no entry requirements.

For students completing the full unit of competency to gain a statement of attainment entry requirements include:

  • You must be 18 years of age or older at the time of enrolment
  • Ability to read and write English and display numeracy skills to at least Year 12 level
  • Have access to Microsoft Office suite or equivalent
  • Have dedicated internet access

Find out more about the entry requirements for this course

Course features

  • Students will also be provided with an option to complete the BSBXCS402 Promote workplace cyber security awareness and best practices assessment and gain an official statement of attainment
  • If students are completing the full unit including the assessment the total number of hours in the unit is 100+

Assessment

  • For students doing the full unit of competency, to gain the statement of attainment there is an assessment to complete
  • With ACBI, you have the flexibility of using a simulated scenario for your assessments or applying assessments to your current workplace

Pathways

If you complete the full unit of competency and assessment this offers a credit transfer towards the full qualifications – either the Certificate IV in IT, The Diploma of IT, or the Advanced Diploma of IT.

About the expert trainer - Dr. Jalal

Dr. Jalal, (Member, IEEE), is a DigiTech professional specializing in information and communication engineering. He earned his Ph.D. from the prestigious Beijing Institute of Technology in Beijing, China, supported by a scholarship from the China Scholarship Council (CSC). Dr. Jalal completed his postdoctoral research at the College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China.

Dr. Jalal has made significant contributions to the fields of cellular and wireless communications, with numerous high-impact publications in IEEE and IET peer-reviewed journals. He has also presented his ground-breaking research at the IET International RADAR Conference in Nanjing, China. Further, he has several years of experience in both the academic and telecommunications industries, having served at the Canterbury Institute of Management, Sydney School of Business and Technology, Australian College of Business and Intelligence, and Polytechnic Institute of Australia.

His industry experience includes roles as an RF Engineer at TeleResources in Sydney, Australia, and a RAN Engineer at Warid Telecommunication in Lahore, Pakistan.

Subjects

Core Units
What AI is and how it works (note: at a foundational level suitable for non-IT professionals)
How AI is being used by businesses
The unique benefits and challenges Generative AI presents
The cyber security risks associated with AI software, particularly generative AI platforms
How to identify employees’ awareness of AI-related cyber security risks
And more!

Want more information about the subjects for this course?

About Australian College of Business Intelligence

Our vision is to be a leading provider of vocational education for domestic and overseas students in the area of business and digital technologies, with leading-edge training responsive to current industry practice and guided by local and global responsibility.

Australian Institute of Business Intelligence Pty Ltd is a Registered Training Organisation (RTO #40835)

Want to know more about this course?
Complete the form and learn about:

  • Pricing and payment options
  • Start dates
  • Subjects
  • Study method
  • How to get help and contact information
  • Everything you need to know before enrolling!

Receive a consultation from a course expert


See student testimonials below

"I found the website easy to use and the contact I received after my enquiry was good. Not too pushy but there if I needed them." - Dimity G.
"All details and info was there and my query was answered quickly." - Soula M.
"Gave me everything I needed and someone called me, pretty much straight away." - Marlon T.

Want to know more about this course?

Get your free course guide now! Complete this easy form and you'll receive a course guide and consultation from Australian College of Business Intelligence

By submitting this enquiry I accept the "Privacy Policy" and "Terms of Use"