Skip to main content

Intermediate Cyber Security Awareness for Business CHA201 - Qualification

Part-Time, GCS Training
TBC
One day

Telephone: 01792 284400 Email: training@gcs.ac.uk

Overview

This one day course will help build on prior experience from our fundamentals course, strengthening your understanding of threats and risks.

You will enhance your understanding of the threat landscape, as well as protection and mitigation strategies. You will explore the importance of monitoring, compliance and risk assessment strategies, the use of incident management, response and continuity planning, as well as how organisations can effectively use a range of tools to maintain cyber hygiene. 

You will learn:

  • Cybersecurity concepts, including the importance of the CIA triad and key principles like authentication, authorisation and non-repudiation
  • Understand and the develop the ability to recognise the evolving advanced threat landscape, various types of malware, and the impact of cyber espionage, APTs and cyber terrorism
  • Essential cybersecurity best practices and the need to implement them in your organisation
  • The ability to implement cyber hygiene best practices in your organisation and utilise cybersecurity tools and technologies

Key information

This course is suitable for micro and small businesses who want to fortify their cyber resilience.

Learners will receive 12 hours of CPD credits for attending this course.

Module one – Review of basic concepts

Fundamentals refresher 

  • Brief review of basic concepts
  • Beyond the CIA Triad: Understanding authentication, authorisation, auditing, accountability, non-repudiation and the risk of over protection

Module two – Threat landscape, malware, advisory, vulnerability and patch management

Advanced threat landscape

  • Evolving nature of cyber threats
  • Understanding different hacker profiles: White hat, black hat, grey hat etc
  • Advanced cyber threats and their implication

Delving into malware

  • Definition and classification: Viruses, trojans, worms, ransomware, spyware
  • Entry points: How malware infect systems
  • Recent malware case studies

Advisory, vulnerability and patch management

  • The role of advisories in cybersecurity
  • Understanding vulnerability management
  • The criticality of regular patching and updates

Module three – Frameworks, compliance, risk and incident management

Cybersecurity frameworks and compliance

  • Why frameworks are essential
  • Overview of recognised frameworks and regulations
  • Adoption challenges and consequences of non compliance
  • Elements of effective compliance management and best practices

Risk management essentials

  • Your role in the risk management process
  • Identifying and protecting information assets
  • Risk management lifecycle

Incident management, response and continuity

  • Introduction to incident management and its importance
  • Detailed incident response process
  • The interplay between business continuity, disaster recovery and incident management

Module four – Third party oversight and maintaining cyber hygiene

Third party oversight: Monitoring, compliance and risk assessment

  • Understanding the external threat landscape
  • Best practices for third party risk assessment

Maintaining cyber hygiene

  • The cyber hygiene checklist: Why do we need it?
  • Tools to add cyber hygiene

Summary and recap

Progression into any of the Microsoft Certified Security Learning Pathways.

The course will be delivered by Gower College Swansea partners, Wales Cyber Innovation Hub.

CIHW Fundamentals of Cyber Security Hygiene (CHA101)
Course code: ZA1833 ST
29/04/2025
Sketty Hall
1 day
Tue
8:30am - 5:30pm
£350
N/A