This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have significant experience in specialist technical skills, or managerial business and people management skills.

Individuals in these roles carry out complex tasks in a specialist field, working independently, leading a team or a strategic direction of a business. They apply their skills across a wide range of industries and business functions, or as a business owner (sole trader/contractor).

The skills required for these roles may include, but are not restricted to:

  • advanced data management information: creating, designing and monitoring complex systems that store data, and optimising organisational knowledge management
  • cyber security: protecting sensitive data and information through security architecture, and developing disaster recovery and contingency plans
  • full stack web development: building advanced user interfaces, developing representational state transfer application program interfaces (REST APIs) and designing user experience solutions
  • further programming: applying advanced ICT languages to maintain security and manage data
  • IT strategy and organisational development: managing and communicating strategic ICT business solutions
  • systems development and analysis: modelling and testing data objects, data processes and preferred ICT system solutions
  • telecommunications network engineering: managing logistics, organisational specifications, regulations and legislative requirements across network projects.

Licensing, legislative, regulatory or certification considerations

No licensing, legislative or certification requirements apply to this qualification at the time of publication.


The course is delivered of 78 weeks with 6 x 10 weeks terms and 18 weeks of holidays

Entry Requirements


Packaging Rules

Total number of units = 16

6 core units  plus 10 elective units

Core units

BSBCRT611 Apply critical thinking for complex problem solving

BSBTWK502 Manage team effectiveness

BSBXCS402 Promote workplace cyber security awareness and best practices

ICTICT608 Interact with clients on a business level

ICTICT618 Manage IP, ethics and privacy in ICT environments

ICTSAD609 Plan and monitor business analysis activities in an ICT environment


  • ICT60220 Advanced Diploma of Information Technology (Cyber Security)
  • ICT60220 Advanced Diploma of Information Technology (Telecommunications Network Engineering)
Always contact your trainer at first ( their contact details have previously bee sent to via your SMIC email account) or you can contact SMIC for support via: Email Telephone 9744-1356

Good sources of information is Australian Cyber Security Centre 


Anti-virus Software
A software program designed to protect your computer or network against computer viruses
Also referred to as a mobile application, an app is a term for software that is commonly used for a smartphone or tablet.
A file sent with an email message
Authenticator App
An app used to confirm the identity of a computer user to allow access and control used within multifactor authentication
The identification of a person by the measurement of their biological features, e.g. fingerprint or voice.
A digital currency (cryptocurrency), used on the Internet for various services.
Brute Force Attack
A type of attack that generates millions of character combinations per second. They are effective against short or single word passwords
Cyber Criminal
Any individual who illegally hacks a computer system to damage or steal information.
Data is information including files, text, numbers, pictures, sound or videos.
Default Settings
Something a computer, operating system or program has predetermined for the user
Dictionary Attacks
A type of attack that generates millions of potential attempts based on rules and databases. These are effective against less complex and commonly used passphrases.
The process of making data unreadable by others for the purpose of preventing others from gaining access to its contents.
A collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data.
Operating System
Software installed on a computer's hard drive that enables computer hardware to communicate with and run computer programs.
Commonly referred to as programs, collection of instructions that enable the user to interact with a computer, its hardware or perform tasks.
A program designed to gather information about a user's activity secretly – usually installed without a user’s knowledge when they click a link.
The Cloud
A network of remote servers that provide massive, distributed storage and processing power.
A physical device that can usually fit on a keyring, which generates a security code for use with networks or software applications.
A type of malware that is often disguised as legitimate software, used by cyber criminals to gain access to users' systems.
A program designed to cause damage, steal personal information, modify data, send e-mail, display messages or a combination of these actions