糖心vlog官网观看

Macquarie University
Cyber Security: Essentials for Workplace
Macquarie University

Cyber Security: Essentials for Workplace

Matt Bushby

Instructor: Matt Bushby

Included with 糖心vlog官网观看 Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

8 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

8 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Identify and prevent common workplace cyber threats like phishing and social engineering.

  • Apply secure practices when using emails, cloud tools, and shared workspaces.

  • Manage passwords, devices, and access safely across professional settings.

  • Build habits that strengthen your organisation鈥檚 cyber hygiene and resilience.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

July 2025

Assessments

10 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Cyber Security: Leadership Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 6 modules in this course

Strong cyber security starts with people, not just policies or firewalls. In this topic, we explore how an organisation鈥檚 culture directly impacts its ability to prevent, detect, and respond to threats. Security isn鈥檛 just a technical challenge, it鈥檚 a human one. You鈥檒l examine the core components that shape an organisation鈥檚 information security culture: leadership, shared values, norms, and employee behaviour. By understanding these dynamics, you鈥檒l be able to assess how security culture can either strengthen or weaken overall defences. Whether you鈥檙e managing risk at the board level or guiding team behaviours on the ground, this topic gives you the tools to drive a people-first, security-aware culture. Because in cyber, culture isn鈥檛 just important, it鈥檚 the frontline.

What's included

2 assignments6 plugins

Why do well-meaning employees still ignore security rules? In this topic, we explore the psychology and usability challenges that explain why users make the decisions they do when it comes to cyber security. Despite training, policies, and best intentions, compliance isn鈥檛 always guaranteed, especially when security measures clash with productivity or convenience. You鈥檒l uncover the subtle forces that shape behaviour in the workplace, from poorly communicated policies to systems that are too cumbersome to follow. We'll examine how usability, clarity, and motivation influence whether people comply, or consciously cut corners. Drawing on real-world examples, you'll gain insight into the push-and-pull between security and usability, and how to design better strategies that drive the right behaviours. By the end of this module, you鈥檒l be able to identify why people don鈥檛 comply, and how to reframe your organisation鈥檚 approach to turn compliance into a shared goal, not a forced obligation.

What's included

2 assignments6 plugins

Traditional security awareness training often falls short, overloaded with rules, poorly contextualised, and quickly forgotten. In this topic, we challenge the status quo and explore how to reimagine cyber training to genuinely influence behaviour and embed a culture of security across the workforce. You鈥檒l examine how engaging content, meaningful delivery, and psychologically informed strategies can transform passive awareness into active vigilance. We'll explore how to shift mindsets, shape perceptions, and create organisational narratives where every employee understands their role in defending against threats. Whether you're refreshing a legacy program or building one from scratch, this topic will give you the frameworks and ideas needed to drive real change, from compliance to culture.

What's included

2 assignments6 plugins

Cyber security decisions are never made in a vacuum. They are shaped by complex ethical and legal obligations that require us to balance innovation, privacy, and accountability. In this topic, we explore the layered risks that emerge when human judgement intersects with data protection, regulatory frameworks, and moral responsibility. You鈥檒l examine how biases, assumptions, and workplace cultures can skew risk assessments, sometimes unintentionally exposing organisations to breaches of trust, law, and reputation. We鈥檒l unpack what ethical data use really looks like, and how to build systems and cultures that hold people and organisations accountable. By the end of this module, you鈥檒l be able to navigate the grey areas of cyber decision-making with greater clarity and confidence, essential for shaping secure, compliant, and ethically sound environments.

What's included

2 assignments5 plugins

Security doesn鈥檛 have to come at the expense of usability. In fact, when systems are hard to navigate, people find workarounds, introducing risk. In this topic, we explore how user-centric design can transform security from a barrier into a seamless part of the user experience. You鈥檒l learn to view interfaces through a human lens, rethinking how authentication, permissions, and alerts are presented to end-users. By applying UX principles to security design, we can build systems that not only protect but also support and guide user behaviour. This module will challenge you to put people first in your security strategy, crafting experiences that are intuitive, accessible, and aligned with how users actually think and behave.

What's included

6 plugins

As the lines between work and home continue to blur, organisations need a fresh, people-first approach to managing security and privacy. In this topic, we鈥檒l explore how to embed security and privacy into the DNA of everyday business practice, not just as technical controls, but as cultural imperatives. You鈥檒l examine what it takes to build a privacy-first culture, where individuals are empowered, not burdened, by secure practices. We鈥檒l look at how organisations can align KPIs and performance incentives to security outcomes, making accountability tangible. And, we鈥檒l consider how to support employees in managing cyber risks across both professional and personal environments. Cyber security is no longer a workplace add-on, it鈥檚 a core life skill. This topic will help you lead that shift, from policy to practice.

What's included

1 reading2 assignments6 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
14 Courses6,491 learners

Offered by

Explore more from Computer Security and Networks

Why people choose 糖心vlog官网观看 for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, 糖心vlog官网观看 is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. 糖心vlog官网观看 allows me to learn without limits."
糖心vlog官网观看 Plus

Open new doors with 糖心vlog官网观看 Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose 糖心vlog官网观看 for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

More questions