The Top Cyber Attacks To Watch Out For
It feels like cyber attacks are constantly headline news, but what actually are they and what are some common examples to watch out for? From spam to phishing and espionage, get the low down on what to look out for and how to stay safe online.
Coder Academy Team
BECOME A FULL STACK DEVELOPER IN 25 WEEKS OF STUDY
Seriously considering a coding bootcamp? Learn more about Australia's first accredited coding bootcamp.
Join our newsletter to find out about upcoming courses and events!
Meet Our Women In Tech: Meet Natasha Munasinghe
Coder Academy Team
Welcome back to our Women In Tech blog series! Our WIT project here at Coder Academy aims to showcase the inspiring, passionate and committed women we meet every day in our mission to increase female representation in the tech sector. Every year, we offer three talented Australian women with big aspirations the opportunity to receive a scholarship that covers 50% of their Fast Track studies across our campuses in Sydney, Brisbane and Melbourne.
Meet our Women In Tech: Sherin Samuel
Coder Academy Team
One of the many things we're passionate about here at Coder Academy is increasing female representation in the tech sector. Every year, three talented Australian women with big aspirations get the opportunity to receive a scholarship that covers 50% of their studies across our campuses in Sydney, Brisbane and Melbourne. This means that every year we meet more and more inspiring women who continuously blow us away with their commitment, passion and brilliance - and so we thought it was about time that you all met them too...
How A Coding Bootcamp Changed My Life
Once upon a time, there was a young adult living and working as a construction laborer in a tiny town in the Australian outback, and quite frankly, he was miserable. He worked his ass off for days on end for a decent enough paycheck, but working is hard, hot and backbreaking conditions. This young adult had a dream of moving back to the city he came from and working in a job that one paid better, and two didn’t leave him wondering what he was going to do with his life. Eventually, he decided to stop toying with the idea and start looking for opportunities and ways to achieve his goal and put himself into a career that flexed his mental muscles and had room for large-scale growth in the future. And then he found the answer, he was to be a programmer!
Working for Tomorrow: Coder Academy consults with PwC on Australia’s Cyber Security + Big Data needs
It is no secret that Big Data and Cyber Security = Big News. Since September 2018, our team of educators at Coder Academy have been engaging with PwC’s Skills for Australia Cross-Sector projects on Big Data and Cyber Security to shape the future of vocational education and training (VET) in Australia. Skills for Australia is the Skills Service Organisation (SSO) responsible for revising VET packages, qualifications and units. The modernisation of the VET sector will provide a framework to up-skill Australians for roles across a variety of industries including Information Technology, Business Services, and Finance.
So you've finished school, "Now What?"
Last week, young people across Australia received their ATAR results. When I think back to my own results day, feelings of excitement, nerves and outright fear come to mind alongside the million-dollar question: “What now?”
Coder Academy in Course Report’s Top 10 Best Coding Bootcamps List
Another year, another great achievement here at Coder Academy as we are featured on Course Report’s list of the best coding bootcamps around the world for the second year in a row!
Pros & Cons of Joining a Cyber Security Bootcamp
Want to start a career in cyber security? Contemplating the best way of doing so? Consider joining a cyber security bootcamp for a time and cost-efficient way of transitioning into a new career as a Penetration Tester, Ethical Hacker, or Cyber Security Analyst.
What is an SQL injection and how can they be prevented?
SQL injections are number one on the OWASP Top 10 list of web application security risks. SQL is utilised in the majority of businesses. So what is an SQL injection and what can you do to stop them?
What does malware analysis involve?
Picture this: you are working for a large financial company and a computer virus is detected spreading through your network. The virus may have been created specifically to target your business. It is important to find out how it got through your defences, who created it, what they know about your company, how they got that information, and what the virus was designed to do. Here's what happens next.