Digital Journeys

A new education model based on experience rather than content intake. We focus on the journey, not just the destination.

Group-based learning experiences with a minimum of 5 participants. Professional facilitators guide you through structured programs designed for real-world application.

Cybersecurity Foundations
5 Weeks • 70 Hours

Cybersecurity Foundations

Sovereign Capability Horizon 2026
Request a Quote

Sponsored by: Good Things Foundation Australia

Theme: Operationalising Resilience: From Horizon 1 to Horizon 2

Good Things Foundation Australia

Course Overview

Welcome to the reality of Horizon 2 of the 2023-2030 Australian Cyber Security Strategy. The era of voluntary uplift is over. In 2026, we focus on "scaling maturity" across the entire economy - from the federal level down to the local supply chain.

This course moves beyond basic hygiene to address the specific threats identified in the State of the Digital Nation 2026 report: the weaponisation of identity, the vulnerability of Operational Technology (OT) in manufacturing, and the "compliance shock" facing SMEs. You will learn to think like a defender in a threat-dense environment.
Week 1

The Sovereign Capability Landscape

Focus:

Horizon 2 (Scaling Maturity) and the "Six Shields" applied to regional Australia.

  • The 2026 Shift: Moving from "Strengthening Foundations" to mandatory operational governance.
  • Regional Vulnerability: Why local manufacturing hubs are targeted as supply chain entry points.
  • The SME Mandate: Understanding that the "security through obscurity" defence is dead.
  • Sovereign Capability: The national push to build a domestic cyber workforce to plug the 370k shortfall.

Activity:

"Supply Chain Audit" - Map your personal or business digital dependencies to identify "soft" entry points.

Week 2

Identity & The Death of Standing Privileges

Focus:

Just-in-Time (JIT) access and the transition to Post-Quantum Cryptography (PQC).

  • Zero Trust Identity: Why "standing privileges" for admins are now a critical vulnerability.
  • Phishing-Resistant MFA: Implementing FIDO2 hardware keys (YubiKeys) as the new standard.
  • Post-Quantum Readiness: Understanding the "Harvest Now, Decrypt Later" threat.

Activity:

"The Cryptographic Inventory" - Identify where you use public-key encryption and plan a migration.

Week 3

AI-Driven Threats & Social Engineering

Focus:

Deepfakes, Voice Cloning, and the "Golden Hour" of response.

  • Hyper-Realistic Phishing: Countering AI-generated pretexting targeting finance and HR teams.
  • Deepfake Voice Scams: Protocols for verifying identity when the CEO's voice is cloned.
  • Ransomware 3.0: Dealing with "double extortion" tactics where data is leaked regardless of payment.
  • ReportCyber: Navigating the ACSC reporting portal during a live incident.

Activity:

"The Golden Hour Simulation" - A tabletop exercise simulating the first 60 minutes of a ransomware breach.

Week 4

Network Hygiene & Operational Technology (OT)

Focus:

Protecting the "Factory Floor" and IoT Infrastructure.

  • IT vs. OT Security: Why you can't just "patch" a SCADA system in a manufacturing plant.
  • Passive Monitoring: Using tools to listen to industrial networks without disrupting production.
  • The Essential Eight (2026 Update): Implementing strict application control and patching in legacy environments.

Activity:

"Guest Network Isolation" - Configuring a segmented network architecture to protect critical assets.

Week 5

The Human Firewall & Crisis Culture

Focus:

Building a "Security Culture" that survives the removal of the small business exemption.

  • Compliance as Culture: Moving from tick-box exercises to genuine "security by default."
  • Digital Mentorship: How to upskill non-technical staff (Cyber Wardens) without overwhelming them.
  • Legal Fallout: Understanding liability under the new Privacy Act reforms (the Statutory Tort).

Capstone Project:

Develop a SME Cyber Resilience Plan for a local business, addressing Privacy Act reforms.

Digital Learning
5 Weeks • 70 Hours

Digital Learning

EdTech Horizon 2026
Request a Quote

Theme: The Walled Garden: Critical AI Literacy in Action

Course Overview

The disruption of 2023 has settled into the operational reality of 2026. Schools and institutions have moved from banning AI to deploying "Walled Gardens" - secure, privacy-compliant AI environments. This course focuses on the National Framework for Generative AI in Schools and the urgent need to bridge the digital skills gap.
Week 1

The "Walled Garden" Infrastructure

Focus:

Privacy-compliant AI and the *National Framework*.

  • Tenant Security: How Victorian schools provide access to tools (e.g., Copilot) without training public models.
  • Data Sovereignty: Protecting student IP within the "Walled Garden."
  • Equity of Access: Mitigating the digital divide between elite and state schools.

Activity:

"Garden Design" - Draft a policy for a school's secure AI tenant, defining data retention and access levels.

Week 2

Critical AI Literacy & Pedagogy

Focus:

Moving beyond "How to use" to "When to critique."

  • Algorithmic Bias: Teaching students to spot the "ghost in the machine."
  • Hallucination Management: AI as a fallible node, not an oracle.
  • Connectivism 2.0: Integrating AI agents into the Personal Learning Network (PLN).

Activity:

"The Bias Hunt" - Analyze AI-generated lesson materials for cultural or socioeconomic bias.

Week 3

Assessment in the Age of AI

Focus:

Process over Product - The return of the "Viva."

  • Death of the Essay: Why take-home written tasks are obsolete.
  • Oral Validation: Implementing "Vivas" to verify student understanding.
  • Process Tracking: Assessing the *prompt engineering* and drafting journey.

Activity:

"Viva Voce Design" - Create an assessment rubric that relies 100% on oral defence.

Week 4

Immersive Learning & Simulation

Focus:

VR, AR, and the "Road to Zero" approach.

  • Simulation Pedagogy: Using VR for high-risk scenarios (safety, biology, physics).
  • Micro-credentials: The "Stackable Degree" model used by Deakin and RMIT.
  • Industry Alignment: Co-designing curriculum with local industry (e.g., Ford, Viva Energy).

Activity:

"Simulation Storyboard" - Design a VR learning module for a dangerous or expensive real-world task.

Week 5

Leadership & The Human Element

Focus:

Leading the "Peopleware" transition.

  • Change Management: Overcoming teacher burnout and resistance.
  • Trust & Safety: Managing the psychological impact of digital transformation.
  • Learning Analytics: Using data to identify "at-risk" students early.

Capstone Project:

Create a Digital Transformation Strategy for a regional school, integrating "Walled Garden" AI.

Digital Ethics
5 Weeks • 70 Hours

Digital Ethics

Compliance Horizon 2026
Request a Quote

Theme: The Age of the Statutory Tort: Ethics as Compliance

Course Overview

Ethics has graduated from the philosophy department to the legal department. With the June 2025 enactment of the Statutory Tort for Serious Invasions of Privacy, ethical failure now carries direct civil liability. This course prepares you for the role of the year: the AI Governance Specialist.
Week 1

The New Compliance Profession

Focus:

The rise of the AI Governance Specialist and the AIGP certification.

  • Ethics vs. Compliance: The shift from "should we?" to "we must."
  • Glass Box Standard: Why explainability now trumps raw accuracy in government AI.
  • Indigenous Data Sovereignty: Operationalising the CARE principles.

Activity:

"Roleplay: The Ethics Officer" - Draft a job description and KPI set for an AI Governance lead.

Week 2

Algorithmic Impact Assessments (AIA)

Focus:

Mandatory governance for Automated Decision Making (ADM).

  • The AIA Workflow: Threshold assessment, deep dive, and public transparency.
  • Human-in-the-Loop: Designing contestability mechanisms for AI decisions.
  • Transparency Reports: How to write a system card that citizens can understand.

Activity:

"Conduct an AIA" - Perform a mock Algorithmic Impact Assessment for a proposed government chatbot.

Week 3

The Privacy Act Reform Shock

Focus:

The removal of the Small Business Exemption and the Statutory Tort.

  • The Statutory Tort (June 2025): Liability for "serious invasions of privacy."
  • No More Exemptions: What the reforms mean for the local real estate agent or café.
  • Doxxing Criminalisation: Legal protections against malicious data exposure.

Activity:

"Liability Stress Test" - Review a small business's data practices against the new Statutory Tort.

Week 4

Bias, Fairness & The "Right to Know"

Focus:

Preventing discrimination and ensuring transparency.

  • Proxy Discrimination: How postcodes become proxies for race in algorithms.
  • The Right to Know: Mandatory disclosure of AI use in consumer interactions.
  • Group Privacy: Harms that occur without individual identification.

Activity:

"Algorithmic Bias Audit" - Test a public dataset for proxy variables that lead to discriminatory outcomes.

Week 5

Global Governance & Treaties

Focus:

Adapting to the EU AI Act and the Bletchley Declaration.

  • Brussels Effect: Why Australian firms must comply with Europe's strict AI tiers.
  • Bletchley Accord: Understanding the "Frontier AI" safety protocols.
  • Corporate Digital Responsibility (CDR): Setting an ethical baseline above the law.

Capstone Project:

Perform a comprehensive Ethical Risk Audit for a corporate AI implementation, proposing a Governance Framework.

Digital Health
5 Weeks • 70 Hours

Digital Health

E-Health Horizon 2026
Request a Quote

Theme: Interoperability & The Data-Driven Clinic

Course Overview

Clinical excellence in 2026 relies on the seamless flow of data. The Digital Health Interoperability Plan (2025) has mandated FHIR standards across the Australian healthcare stack. This journey focuses on how clinicians and administrators can leverage AI and data to improve patient outcomes without compromising privacy.
Week 1

Interoperability & FHIR Standards

Focus:

The technical and clinical foundation of modern health data.

  • The FHIR Shift: Moving from siloed records to real-time data exchange (Fast Healthcare Interoperability Resources).
  • My Health Record (2026): Navigating the mandatory 'opt-out' governance model.
  • Identity in Health: Secure patient identifier management in a decentralized system.

Activity:

"Data Flow Mapping" - Trace a patient journey through three different health services to identify data blockages.

Week 2

Clinical AI & Decision Support

Focus:

Using AI as a 'co-pilot' in diagnosis and triage.

  • Decision Support Systems (DSS): Integrating AI alerts into the clinical workflow.
  • Precision Medicine: Customising treatments using genomic data pipelines.
  • Automation Bias: Mitigating the risk of over-reliance on AI triage tools.

Activity:

"AI Workflow Design" - Create a safety protocol for integrating an AI diagnostic tool into a general practice.

Week 3

Cyber-Resilience in Healthcare

Focus:

Protecting the Most Sensitive Data: Life and Death Security.

  • Ransomware in Health: Protocols for when the hospital network goes dark.
  • IoT/Medical Device Security: Protecting pacemakers and insulin pumps from network intrusion.
  • Insider Threat: Managing access in high-pressure clinical environments.

Activity:

"Incident Response Tabletop" - Simulate a cyber-attack on a regional health network, focusing on patient safety.

Week 4

Remote Care & The 'Hospital at Home'

Focus:

Telehealth 3.0 and RPM (Remote Patient Monitoring).

  • Hospital at Home: Managing acute patients remotely using wearable sensors.
  • Regional Equity: Using Starlink and low-latency links for rural telemedicine.
  • The Virtual Ward: Clinical governance for patients you never see in person.

Activity:

"Remote Clinic Blueprint" - Design a technical setup for a virtual clinic serving a remote Indigenous community.

Week 5

The Future of Health Informatics

Focus:

Leadership in a digital-first health system.

  • Digital Health Leadership: Upskilling the clinical workforce (Nurse Informaticists).
  • Public Health Analytics: Using population data to predict disease outbreaks.
  • Patient Sovereignty: Implementing 'Patient-Owned' data models (Solid/Web3).

Capstone Project:

Design a Virtual Ward implementation strategy for a regional hospital, addressing interoperability and cyber-safety.

Ready to Start Your Journey?

Our Digital Journeys are group-based learning experiences with a minimum of 5 participants.

Contact us to discuss your team's learning needs and receive a customised quote.

Request a Quote