Introduction
In this module you will be introduced to the course and learn about the history of the Essential Eight Maturity Model. You will also learn about the benefits of the Essential Eight mitigation strategies and the level of risk addressed at each maturity level.
0/4
Cyber Security Frameworks
In this topic we survey different cyber security frameworks and consider how the Essential Eight can fit into the overall cyber security strategy of an organisation.
0/3
The Eight Essential Mitigation Strategies
In this topic we examine each mitigation strategy and consider the overall objectives they are designed to achieve.
0/7
The Four Maturity Levels
In this topic we will explore the four maturity levels of the Essential Eight Maturity Model and consider how security controls can be progressively expanded to meet increased threat levels.
0/5
Implementation Tips, Tricks and Traps
In this chapter we map out the steps you need to take to implement Essential Eight or uplift your maturity level. We consider some pitfalls and mistakes that can derail your implementation efforts, and provide useful advice to help keep you on-track.