Data Security Training
Our Data security workshops and courses help your organisation to protect digital data from the malicious actions of unauthorized users, such as a cyberattack or a data breach.
Please select the course that you’re interested in
Please select the course that you are interested in
Cybersecurity Fundamentals
Course Overview
- Cybersecurity concepts
- Security architecture principles
- Security of networks, systems, applications and data
- Incident response
- The security implications of the adoption of emerging technologies
Audience:
This course is ideal for professionals wishing to enhance comprehensive understanding of Cybersecurity’s key concepts and its impacts on business.
The Cybersecurity Fundamentals Course provides dynamic learning experience where learners can explore foundational cybersecurity knowledge and kick-start career in this crucial area.
Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of information technology (IT).
Prerequisite:
There are no formal prerequisites.
Duration:
This is one-day Cybersecurity Fundamentals Course. The course starts at 09:30 and runs until 16:30.
Alternate timings can be arranged upon request. The course can be held on a date that suits you.
Location:
Our Cybersecurity Fundamentals Course will be delivered Online Remotely using online training platforms. It can also be run at our training venue near Liverpool Street (London) or any preferred location in the UK or Europe.
Cybersecurity Fundamentals Course Outline
INTRODUCTION TO CYBERSECURITYCybersecurity objectives Cybersecurity roles Differences between Information Security and Cybersecurity CYBERSECURITY PRINCIPLESConfidentiality, integrity and availability Authentication and nonrepudiation INFORMATION SECURITY (IS) WITHIN LIFECYCLE MANAGEMENTLifecycle management landscape Security architecture processes Security architecture tools Intermediate lifecycle management concepts |
RISKS AND VULNERABILITIESBasics of risk management Operational threat environments Classes of attacks INCIDENT RESPONSEIncident categories Incident response Incident recovery FUTURE IMPLICATIONS AND EVOLVING TECHNOLOGIESNew and emerging IT and IS technologies Mobile security issues, risks and vulnerabilities Cloud concepts around data and collaboration |
One to One
(which includes a tailor-made training programme for the individual where they can mix and match the topics from various levels to get the most cost-effective training
Group for up to 8 learners
What Our Clients Say
Extras
This is a sample of some of the Short training videos. Please note that you can get access to many more, once you have done a course with us and are registered as one of our delegates.