Intermediate Cyber Security Awareness for Business CHA201 - Qualification
Telephone: 01792 284400 Email: training@gcs.ac.uk
Overview
This one day course will help build on prior experience from our fundamentals course, strengthening your understanding of threats and risks.
You will enhance your understanding of the threat landscape, as well as protection and mitigation strategies. You will explore the importance of monitoring, compliance and risk assessment strategies, the use of incident management, response and continuity planning, as well as how organisations can effectively use a range of tools to maintain cyber hygiene.
You will learn:
- Cybersecurity concepts, including the importance of the CIA triad and key principles like authentication, authorisation and non-repudiation
- Understand and the develop the ability to recognise the evolving advanced threat landscape, various types of malware, and the impact of cyber espionage, APTs and cyber terrorism
- Essential cybersecurity best practices and the need to implement them in your organisation
- The ability to implement cyber hygiene best practices in your organisation and utilise cybersecurity tools and technologies
Key information
This course is suitable for micro and small businesses who want to fortify their cyber resilience.
Learners will receive 12 hours of CPD credits for attending this course.
Module one – Review of basic concepts
Fundamentals refresher
- Brief review of basic concepts
- Beyond the CIA Triad: Understanding authentication, authorisation, auditing, accountability, non-repudiation and the risk of over protection
Module two – Threat landscape, malware, advisory, vulnerability and patch management
Advanced threat landscape
- Evolving nature of cyber threats
- Understanding different hacker profiles: White hat, black hat, grey hat etc
- Advanced cyber threats and their implication
Delving into malware
- Definition and classification: Viruses, trojans, worms, ransomware, spyware
- Entry points: How malware infect systems
- Recent malware case studies
Advisory, vulnerability and patch management
- The role of advisories in cybersecurity
- Understanding vulnerability management
- The criticality of regular patching and updates
Module three – Frameworks, compliance, risk and incident management
Cybersecurity frameworks and compliance
- Why frameworks are essential
- Overview of recognised frameworks and regulations
- Adoption challenges and consequences of non compliance
- Elements of effective compliance management and best practices
Risk management essentials
- Your role in the risk management process
- Identifying and protecting information assets
- Risk management lifecycle
Incident management, response and continuity
- Introduction to incident management and its importance
- Detailed incident response process
- The interplay between business continuity, disaster recovery and incident management
Module four – Third party oversight and maintaining cyber hygiene
Third party oversight: Monitoring, compliance and risk assessment
- Understanding the external threat landscape
- Best practices for third party risk assessment
Maintaining cyber hygiene
- The cyber hygiene checklist: Why do we need it?
- Tools to add cyber hygiene
Summary and recap
Progression into any of the Microsoft Certified Security Learning Pathways.
The course will be delivered by Gower College Swansea partners, Wales Cyber Innovation Hub.