Skip to main content

Build Cybersecurity Skills
with Our Stackable,
SFIA-Accredited Microcredentials

Learn specialist cyber skills to stay current, protect your organisation and build your career.

Cybersecurity Threats Are Evolving Fast

As cyber threats grow in frequency and sophistication, organisations need capable professionals — not months or years from now, but today.

That’s why BSI Learning has created stackable, SFIA-accredited Microcredentials designed to help professionals build or refresh their cyber capabilities in just 8 hours per module.

Each Microcredential is mapped to the Skills Framework for the Information Age (SFIA) and is verified with accompanying digital badges to validate your skills against the internationally recognised standard.

Whether you’re an existing cyber specialist refreshing your skills, or a new practitioner building foundational or specialist skills, our microcredentials are practical and allow you to learn today and apply tomorrow.

Watch Our Video to Learn More

Learn Specialist Cyber Skills to Stay Current,
Protect Organisation and Build Your Career

Our Microcredentials are:
FastEach course takes just 8 hours to complete — short, focused and practical.
Stackable –  Choose from 1–6 Microcredentials. If you wish to, you can credit them towards a nationally recognised qualification in the future.
Recognised – Each Microcredential is aligned to the global SFIA framework, with digital badges issued to verify the specific professional skills you’ve gained.

Cyber Security Microcredentials

Our Cybersecurity Microcredentials are short, targeted courses aligned with the Skills Framework for the Information Age (SFIA).

Each one is designed with clear learning outcomes, practical application and comes with its associated SFIA accredited badges, recognised across the digital skills industry.

Read on to find out more:

1. Understanding Cybersecurity from the Inside Out - $800

Duration: 8 hours

Format: Online, self-paced with knowledge checks and a short assessment

Topics covered

  • Cyber strategy fundamentals: risk, controls, culture, assurance
  • Identity as perimeter: IAM, MFA, RBAC, access boundaries
  • Layered security: defence-in-depth across people, process, tech
  • Zero Trust essentials: verify explicitly, limit blast radius, assume breach

What you’ll learn

  • Articulate the core pillars of an enterprise cybersecurity strategy
  • Explain how IAM, least privilege and Zero Trust reduce risk in practice
  • Map layered controls to common business risks and compliance drivers
  • Recommend foundational steps to strengthen an organisation’s posture

Badges earned

Information Security
(SCTY) – Level 3

Identity & Access Management
(IAMT) – Level 3

2. Cybersecurity with Integrity - $800

Duration: 8 hours

Format: Online, self-paced with case-based reflection and a short assessment

Topics covered

  • Professional ethics in cyber: integrity, accountability, transparency
  • Responsible disclosure & communication with stakeholders
  • Policy interpretation: when rules conflict and evidence is incomplete
  • Decision frameworks: harm reduction, proportionality, auditability

What you’ll learn

  • Apply ethical principles to everyday cybersecurity decisions and dilemmas
  • Balance security, privacy, transparency and responsible disclosure
  • Interpret policies and standards to guide actions during ambiguous events
  • Recommend proportionate responses to user behaviour and insider risk signals
  • Apply ethical principles to everyday cybersecurity decisions and dilemmas
  • Balance security, privacy, transparency and responsible disclosure
  • Interpret policies and standards to guide actions during ambiguous events
  • Recommend proportionate responses to user behaviour and insider risk signals

Badges earned

Information Assurance
(INAS) – Level 3

Problem Management
(PBMG) – Level 3

3. How Security Gets Tested - $800

Duration: 8 hours

Format: Online, self-paced with guided simulations and a short assessment

Topics covered

  • Pen test lifecycle: planning, discovery, exploitation (concepts), reporting
  • Vulnerability assessment: scan types, common findings, false positives
  • Secure testing practices: safety, scope control, artefact handling
  • Handover: feeding results to operations, risk registers & patch cycles

What you’ll learn

  • Describe the phases, scope and guardrails of penetration testing
  • Run through typical vulnerability assessment workflows at a conceptual level
  • Interpret scanner/report outputs to prioritise remediation paths
  • Integrate findings into operational processes and secure change

Badges earned

Penetration Testing
(PENT) – Level 3

4. The Role of Reconnaissance in Assessing Cyber Risk - $800

Duration: 8 hours

Format: Online, self-paced with practical activities and a short assessment

Topics covered

  • OSINT fundamentals: scope, rules of engagement, ethics & legality
  • Passive techniques: DNS, WHOIS, metadata, social & code repositories
  • Tooling basics (e.g., search operators, footprinting platforms)
  • Interpreting signals: services, credentials, code leaks, shadow IT
  • Reporting: evidence logs, risk summaries, shareable insights

What you’ll learn

  • Explain the purpose and ethics of passive reconnaissance (OSINT)
  • Systematically gather and document publicly available information
  • Identify exposed data, misconfigurations and attack surface indicators
  • Distil findings into a concise risk snapshot with recommended next steps
  • Apply legal, policy and privacy considerations when handling discovered information

Badges earned

Vulnerability Assessment
(VUAS) – Level 3

Vulnerability Research
(VURE) – Level 3

Threat Intelligence
(THIN) – Level 3

Methods & Tools
(METL) – Level 3

5. An Introduction to Digital Forensics in Action - $800

Duration: 8 hours

Format: Online, self-paced with walkthroughs and a short assessment

Topics covered

  • Forensic readiness: scope, roles, legal/organisational constraints
  • Handling principles: hashing, volatile vs non-volatile data, contamination risks
  • Common artefacts & sources: logs, endpoints, accounts, cloud trails
  • Recording & reporting: notes, exhibits, basic timelines

What you’ll learn

  • Explain the digital forensics process and evidence lifecycle
  • Apply chain-of-custody, integrity and confidentiality principles
  • Review simple timelines/logs to form defensible hypotheses
  • Document observations suitable for handover to specialist teams

Badges earned

Digital Forensics
(DGFS) – Level 3

6. Foundations of Secure Network Infrastructure - $800

Duration: 8 hours

Format: Online, self-paced with scenarios and a short assessment

Topics covered

  • Network security building blocks: firewalls, ACLs, zones, VPNs
  • Identity & access: AAA, RBAC, MFA, directory-backed access
  • Endpoint & network tooling: EDR, NAC, SIEM (conceptual usage)
  • Incident triage playbook: common symptoms → likely causes → actions
  • Defence-in-depth & Zero Trust foundations

What you’ll learn

  • Describe core network security concepts: segmentation, least privilege, Zero Trust
  • Interpret common logs and alerts to triage basic access and connectivity issues
  • Evaluate authentication and remote access controls (MFA, VPN, RBAC)
  • Outline defence-in-depth controls across endpoints, network and identity layers
  • Recommend operational responses for typical network security tickets

Badges earned

Security Operations
(SCAD) – Level 3

Network Support
(NTAS) – Level 3

Infrastructure Operations
(ITOP) – Level 3

Upskilling Australia’s Leading Organisations
to Lead in the Digital Future

Our SFIA-accredited digital skills training supports the professional development of cyber
practitioners across the enterprise, government and industry.

Get started today by clicking the link below, or speak
to one of the BSI Learning team to find out more.