<img src="https://secure.leadforensics.com/146720.png" style="display:none;"> Cyber Security Masterclass
REQUEST A CALL BACK
BUILD YOUR IN-HOUSE PROGRAMME

Cyber Security Masterclass

In association with:

Cyber Security Masterclass

A one day masterclass held at venues across the UK, this course is one of our Essential Business Toolkit Series.

The one day Cyber Security masterclass course serves as an introduction to the exciting field of cybersecurity. It is designed to raise your awareness of the risks to online security and will help you understand what measures can be taken to prevent yourself and your workplace from becoming victim to a cyber-attack.

The course helps learners to develop an awareness of common cyber risks, including phishing, malware and identity theft, and provides practical tips that can be applied in the workplace to prevent unauthorised access to confidential information.

It is one of our Essential Business Toolkit Series. The course can be taken on its own or as part of the series. By attending this course, you will gain invaluable insights from industry experts in to new ways of working, innovative concepts and the latest theories that can be applied instantly on returning to your own organisation.

There are currently no dates available for this course.
However, we can tailor this course to your company via the virtual classroom or at a location of your choice.

Contact us and we'll get in touch to discuss your bespoke group training needs.

Course Summary

Qualification:

CPD Endorsed


Duration:

1 Day


Delivery Method and Price:

Virtual Classroom:
Price on Enquiry

Face to Face Classroom:
Price on Enquiry

ASK A QUESTION

Interested in this Course?

About the Programme

By the end of this course, you will be able to:

  1. Define and use key terms and concepts in the field of cybersecurity
  2. Identify and distinguish threat actors and their motivations
  3. Match appropriate types of controls to the actions of different threat actors
  4. Describe the differences and interactions among international agencies related to cybersecurity
  5. Describe at least two potential legal challenges to cybersecurity in your country
  6. Start to protect your digital life
  7. Recognise threats to your online safety and take steps to reduce the risk of online threats
  8. Understand concepts including malware, viruses and trojans
  9. Consider network security, cryptography and identity theft

*Please note that some of the materials and objectives may be subject to change depending on discussions, activities and needs of the cohort upon reflection of delegate responses to the pre-programme questionnaires.*

Through interactive presentations and open discussion, the facilitators will deliver a thought-provoking session, providing you with the key information, details and facts needed in an engaging and memorable environment: By the end of the course, you will be able to:

    • Explain basic cyber security terminology; have skills for keeping up to date on cyber security issues; and be able to identify information assets
    • Describe basic authentication mechanisms; have skills to improve their password security; and be aware of alternative authentication methods
    • Identify main malware types; awareness of different malware propagation methods; and skills for preventing malware infections
    • Explain basic networking concepts; be aware of network security challenges; and have knowledge of key networking standards
    • Describe cryptography terminology; be able to use cryptography for email; be aware of applications of cryptography
    • Demonstrate understanding of firewalls, virtual private networks and network intrusion detection and prevention technologies
    • Describe legal and regulatory issues relating to cyber security; and understand how to recover from security failures
    • Apply basic risk analysis and management techniques
 

Session 1

The day will cover the following elements:

  • Threat landscape: terminology, cyber security threats, keeping up to date
  • Authentication: access control, passwords, two-factor authentication
  • Malware: types of malware, attack vectors, preventing infection
  • Networking and communications: fundamentals, security challenges, standards
  • Cryptography: symmetric and asymmetric cryptography, applications
  • Network security: firewalls, virtual private networks, intrusion detection/prevention
  • When your defenses fail: cyber security laws, recovering from attacks
  • Managing security risks: risk analysis and management

Whilst this programme is not linked to a formal qualification, it will contribute to delegate’s ongoing personal and professional development

Tom Robinson

Tom Robinson

Tutor

A versatile business leader having held 5 divisional MD roles and been Chief Sustainability Officer within a FTSE 250 plc, followed by 6 years as Chief Executive within a private, family-owned business. Now operating as a consultant and business advisor assisting organisations improve their performance.

Tom has been responsible for delivering projects and services to customers in both private and public sectors including communications, defence, retail, health and logistics. Businesses Tom has led include construction, facilities management, property development, architecture, vehicle and plant asset management, recruitment and training.

He has a track record of driving transformation and improvement and is driven by an enthusiasm for customer service and responsible business.

Tom is a member of the Advisory Board to the Lincoln International Business School.

Our dedicated In-House Training team can work with you to create a tailored training course that creates an optimal learning experience. Our bespoke built training programmes are designed around your needs and allow you to meet the specific requirements of your business.

Click here to view our In-House Training services.

Download In-House Training PDF
Enquire
Download In-House PDF

Is this course right for you?

  • Define and use key terms and concepts in the field of cybersecurity
  • Identify and distinguish threat actors and their motivations
  • Match appropriate types of controls to the actions of different threat actors
  • Describe the differences and interactions among international agencies related to cybersecurity
  • Describe at least two potential legal challenges to cybersecurity in your country
  • Start to protect your digital life
  • Recognise threats to your online safety and take steps to reduce the risk of online threats
  • Understand concepts including malware, viruses and trojans
  • Consider network security, cryptography and identity theft

Testimonials

Accommodation Made Easy with Booking.com

Accommodation Made Easy

On confirmation of your course booking, you'll have the option to book accommodation from the world renowned and trusted Booking.com. Book your course, book your accommodation, expand your skills. Easy as 1 2 3.

Frequently Asked Questions

Our Reviews