Skip to main content

Australia’s first stackable,
SFIA-aligned Cyber Security
Microcredentials Course

Cybersecurity skills that fit your career – and your schedule.

Fast – Each module takes just 8 hours — no 12-month commitment.
Stackable – Choose 1–6 micro-credentials that may be credited towards a nationally recognised qualification.
Recognised – SFIA-aligned, digitally badged and instantly shareable.

Cybersecurity threats are evolving fast and so is the need for skilled professionals. But traditional qualifications can take months or years to complete, leaving gaps when organisations need capability now.

That’s why BSI Learning has created Australia’s first stackable, SFIA-aligned microcredentials in cybersecurity.

Each credential is mapped to industry standards and comes with a digital badge you can showcase instantly. Whether you are building foundations, specialising in ethical hacking, or strengthening your role in government or enterprise, these microcredentials help you learn today, apply tomorrow.

Cyber Security Microcredentials

Our Cyber Security Microcredentials are short, targeted courses aligned with the Skills Framework for the Information Age (SFIA).

Each one is designed with clear learning outcomes, practical application and a certification badge recognised across industry.

Every microcredential outlines its duration, format, core topics, learning outcomes, and SFIA-aligned badges—so you know exactly what you’ll gain before you begin.

1. Understanding Cybersecurity from the Inside Out - $800

Duration: 8 hours

Format: Online, self-paced with knowledge checks and a short assessment

Topics covered

  • Cyber strategy fundamentals: risk, controls, culture, assurance
  • Identity as perimeter: IAM, MFA, RBAC, access boundaries
  • Layered security: defence-in-depth across people, process, tech
  • Zero Trust essentials: verify explicitly, limit blast radius, assume breach

What you’ll learn

  • Articulate the core pillars of an enterprise cybersecurity strategy
  • Explain how IAM, least privilege and Zero Trust reduce risk in practice
  • Map layered controls to common business risks and compliance drivers
  • Recommend foundational steps to strengthen an organisation’s posture

Badges earned

  • SCTY – Information Security
  • IAMT – Identity & Access Management

Information Security (SCTY)
– Level 3

Identity & Access
Management (IAMT) – Level 3

2. Cybersecurity with Integrity - $800

Duration: 8 hours

Format: Online, self-paced with case-based reflection and a short assessment

Topics covered

  • Professional ethics in cyber: integrity, accountability, transparency
  • Responsible disclosure & communication with stakeholders
  • Policy interpretation: when rules conflict and evidence is incomplete
  • Decision frameworks: harm reduction, proportionality, auditability

What you’ll learn

  • Apply ethical principles to everyday cybersecurity decisions and dilemmas
  • Balance security, privacy, transparency and responsible disclosure
  • Interpret policies and standards to guide actions during ambiguous events
  • Recommend proportionate responses to user behaviour and insider risk signals

Badges earned

  • INAS – Information Assurance
  • PBMG – Problem Management

Information Assurance
(INAS) – Level 3

Problem Management
(PBMG) – Level 3

3. How Security Gets Tested - $800

Duration: 8 hours

Format: Online, self-paced with guided simulations and a short assessment

Topics covered

  • Pen test lifecycle: planning, discovery, exploitation (concepts), reporting
  • Vulnerability assessment: scan types, common findings, false positives
  • Secure testing practices: safety, scope control, artefact handling
  • Handover: feeding results to operations, risk registers & patch cycles

What you’ll learn

  • Describe the phases, scope and guardrails of penetration testing
  • Run through typical vulnerability assessment workflows at a conceptual level
  • Interpret scanner/report outputs to prioritise remediation paths
  • Integrate findings into operational processes and secure change

Badges earned

  • PENT – Penetration Testing

Penetration Testing (PENT)
– Level 3

4. The Role of Reconnaissance in Assessing Cyber Risk - $800

Duration: 8 hours

Format: Online, self-paced with practical activities and a short assessment

Topics covered

  • OSINT fundamentals: scope, rules of engagement, ethics & legality
  • Passive techniques: DNS, WHOIS, metadata, social & code repositories
  • Tooling basics (e.g., search operators, footprinting platforms)
  • Interpreting signals: services, credentials, code leaks, shadow IT
  • Reporting: evidence logs, risk summaries, shareable insights

What you’ll learn

  • Explain the purpose and ethics of passive reconnaissance (OSINT)
  • Systematically gather and document publicly available information
  • Identify exposed data, misconfigurations and attack surface indicators
  • Distil findings into a concise risk snapshot with recommended next steps
  • Apply legal, policy and privacy considerations when handling discovered information

Badges earned

  • VUAS – Vulnerability Assessment
  • VURE – Vulnerability Research
  • THIN – Threat Intelligence
  • METL – Methods & Tools

Vulnerability Assessment
(VUAS) – Level 3

Vulnerability Research
(VURE) – Level 3

Threat Intelligence (THIN) –
Level 3

Methods & Tools (METL) –
Level 3

5. An Introduction to Digital Forensics in Action - $800

Duration: 8 hours

Format: Online, self-paced with walkthroughs and a short assessment

Topics covered

  • Forensic readiness: scope, roles, legal/organisational constraints
  • Handling principles: hashing, volatile vs non-volatile data, contamination risks
  • Common artefacts & sources: logs, endpoints, accounts, cloud trails
  • Recording & reporting: notes, exhibits, basic timelines

What you’ll learn

  • Explain the digital forensics process and evidence lifecycle
  • Apply chain-of-custody, integrity and confidentiality principles
  • Review simple timelines/logs to form defensible hypotheses
  • Document observations suitable for handover to specialist teams

Badges earned

  • DGFS – Digital Forensics

Digital Forensics (DGFS) –
Level 3

6. Foundations of Secure Network Infrastructure - $800

Duration: 8 hours

Format: Online, self-paced with scenarios and a short assessment

Topics covered

  • Network security building blocks: firewalls, ACLs, zones, VPNs
  • Identity & access: AAA, RBAC, MFA, directory-backed access
  • Endpoint & network tooling: EDR, NAC, SIEM (conceptual usage)
  • Incident triage playbook: common symptoms → likely causes → actions
  • Defence-in-depth & Zero Trust foundations

What you’ll learn

  • Describe core network security concepts: segmentation, least privilege, Zero Trust
  • Interpret common logs and alerts to triage basic access and connectivity issues
  • Evaluate authentication and remote access controls (MFA, VPN, RBAC)
  • Outline defence-in-depth controls across endpoints, network and identity layers
  • Recommend operational responses for typical network security tickets

Badges earned

  • SCAD – Security Operations
  • NTAS – Network Support
  • ITOP – Infrastructure Operations

Security Operations (SCAD)
– Level 3

Network Support (NTAS) –
Level 3

Infrastructure Operations
(ITOP) – Level 3

Upskilling Australia’s Largest Organisations
to Lead in the Digital Future

Our digital skills training is valued across many organisations.