Focused bundle
3 courses
A targeted CSA path for teams building immediate capability around a defined risk area.

business.cybe.tech
B2B access to Cybe cybersecurity, privacy, identity, intelligence, digital trust, and cyber skills services for organizations.
Cybe services
Cybe Business introduces the services Cybe delivers to companies, public sector teams, and professional workforces. Cyber Skill Academy is one featured offer inside that broader services portfolio.
External B2B commerce platforms can help customers buy selected offers, but they are sales channels. The product story belongs to Cybe services and the outcomes Cybe provides.
Cybersecurity
Data privacy
Cyber skills
Featured academy offer
This is where the Cybe and Macquarie University Cyber Skills Academy partnership belongs: as one strong Cybe service, with flexible bundles and course pathways.

MicroSkills
Short targeted units for fast workforce upskilling and awareness refreshers.
Cyber Defender
Essential cyber security skills for employees who need stronger day-to-day habits.
Cyber Manager
Governance, risk, leadership, and response readiness for managers and decision makers.
Cyber Specialist
Advanced technical pathways for teams that need deeper practitioner capability.
Focused bundle
A targeted CSA path for teams building immediate capability around a defined risk area.
Team bundle
A broader learning path for departments that need shared cyber fluency and practical response habits.
Full suite
The complete CSA suite for organizations standardizing cyber education across larger workforces.

Business onboarding flow
Service catalog
Cyber Skill Academy
Cyber skills
Practical cyber education for organizations that need workforce cyber fluency and role-based capability building.
Outcome: Upskill employees, managers, and specialist teams with structured cyber pathways.
Deliverable: Course bundle selection, seat planning, onboarding, and learner activation.
DPO
Privacy leadership
Data Protection Officer advisory support for organizations building accountable privacy operations.
Outcome: Create clearer ownership for privacy decisions, records, and internal escalation.
Deliverable: DPO advisory scope, governance rhythm, documentation support, and guidance sessions.
PDP Audit
Data privacy
Personal data protection assessment to understand readiness, gaps, and priority remediation areas.
Outcome: Understand PDP readiness and focus remediation on the highest-impact gaps.
Deliverable: Assessment findings, risk view, and practical improvement recommendations.
Security Testing
Cyber assurance
Testing services that help teams identify weaknesses before attackers or incidents expose them.
Outcome: Find exploitable weaknesses across applications, infrastructure, and exposed surfaces.
Deliverable: Testing scope, validated findings, severity view, and remediation briefing.
Threat Intelligence
Cyber intelligence
Contextual threat insight to support better decisions, monitoring, and response planning.
Outcome: Track relevant cyber threats and translate external signals into business action.
Deliverable: Threat briefings, monitoring context, indicators, and response recommendations.
Block Identity
Digital trust
Identity and trust services for organizations that need stronger verification and access confidence.
Outcome: Strengthen digital trust around identity, access, and verification journeys.
Deliverable: Identity use-case scoping, trust controls, and implementation advisory.
Data Privacy Training
Training
Training for teams that handle personal data, compliance duties, and day-to-day privacy risk.
Outcome: Give operational teams practical habits for handling personal data responsibly.
Deliverable: Role-aware privacy training, session materials, and workforce delivery plan.
CSA course catalogue
01
10h
Breach readiness, response coordination, and recovery practice.
02
5-10h
Leadership habits for governance, risk decisions, and cyber operations.
03
60h
Intelligent defence concepts for AI-aware threat detection and cyber operations.
04
60h
Advanced information protection, cryptography, and secure system thinking.
05
45h
Cyber strategy, compliance planning, governance, and program direction.
06
45h
Privacy obligations, personal data protection, and incident preparation.
07
45h
Security architecture and privacy-preserving controls for sensitive data.
08
55h
Evidence handling, investigation workflow, and digital truth finding.
09
45h
IAM, authentication, federation, access confidence, and verification patterns.
10
80h
Mobile device risk, mobile forensics, and secure mobile operations.
11
60h
Secure software delivery, cloud-aware engineering, and practical DevSecOps habits.
12
50h
Culture, awareness, and human risk reduction across the organization.
Partner marketplaces
Cybe can place selected courses or services on partner marketplaces such as Lintasarta LAMPU when that is the right buying path for a customer.
Order and subscription sync should only be described as a future connection after partner API or webhook details are available.
Start the conversation