Press esc to close
Press esc to close
Fill out your contact details below and our training experts will be in touch.
If you wish to make any changes to your course, please log a ticket and choose the category ‘booking change’
Back to Course Information
This course follows the following course structure:
Cyber Threats Affecting Business
This module focusses on the potential threats that a business can face. Our trainers will begin by explaining one of the greatest cyber security threats facing businesses today: Hacking. Delegates will study the motives behind hacking and the tools hackers use. Phishing will also be defined and described. Training will then move on to discuss other areas of cyber security, touching upon threats associated with social media, the web, and mobile devices. This module aims to supply delegates with an overarching understanding of the threats affecting businesses in today's technological world.
Actions for Combatting Cyber Threats
The second module of this Certified Cyber Security Professional training course will primarily help delegates to understand the steps that they can take to prevent cyber-attacks within their enterprise. Training begins with a basic explanation of the importance of password protection, before moving on to more technical methods of mitigation such as encryption and 2-Factor Authentication. Physical Security, often overlooked as an efficient cybersecurity prevention mechanism is also covered. Thus, upon completion, candidates will be well-informed and understand the methods of combatting cyber security threats and preventing malicious attacks.
Individuals with an interest in improving their understanding of cyber security should attend this CCS-PRO course.
This course has no prerequisites, but it may help candidates if they have some background knowledge of cybersecurity.
Cyber Security is becoming increasingly prevalent, with a larger number of businesses becoming affected by cyber-attacks each year. This Certified Cyber Security Professional (CCS-PRO) training course will teach you how to avoid and protect against cyber security threats. Cyber Security is a crucial aspect of a business, and it must be made certain that the correct procedures are enacted to guarantee the best security for the enterprise. During one day of training, delegates will gain an understanding of the importance of cyber security and the cyber security practices that can be implemented within the business environment.
Our CCS-PRO training course provides delegates with up-to-date knowledge of the cybersecurity threats that organisations face today, and the best day-to-day actions to follow to mitigate risks. Our trainers are extremely experienced in this field and are dedicated to ensuring our delegates pass the CCS-PRO exam and leave with the best understanding of Cyber Security. With this impressive qualification, professionals can enhance their value within their company and use their knowledge to improve cybersecurity within their enterprise.
The Certified Cyber Security Professional course includes:
The course covers the following topics:
Understanding Cyber Threats
Preventing Cyber Threats
The course is designed for anybody who uses information technology as part of their job.
There are no prerequisites to attend.
With more businesses being the victims of cyber-attacks each year, it is vitally important that organisations can secure themselves. This means all staff need to be aware of risks and how to mitigate them.
Our Cyber Security Awareness course provides critical training in cyber security threats and how to avoid them. Designed for any employee at any organisational level, the training provides easy to follow best practice procedures for all staff to follow to reduce risk and keep themselves and the company secure. During the 1-day course, delegates will learn all about the cyber security threats they face, how to identify them and how they can help prevent them through simple day to day security procedures.
You will be provided with:
The course covers the following topics:
Introduction to Cyber Risk
Dealing with Risk
By the end of the course, you will:
The course is designed for cyber security practitioners who are involved in planning and executing risk management strategy. It is also suitable for general risk managers who would like improve their knowledge of cyber risk.
There are no prerequisites to attend.
This 1-day course provides a comprehensive introduction to the assessment and management of cyber security. Equipping cyber security practitioners and managers with an understanding of what should be in a risk management strategy, the course provides foundation-level knowledge of information security management best practice to help organisations defend themselves from threats.
In this Cyber Security Risk Management course, delegates will be provided with:
This course covers the following topics:
The course is designed for anybody working in a security role who is in charge of protecting their organisation’s data.
There are no prerequisites, but some understanding of information security will be an advantage.
This Computer Forensics Foundation training course provides you with a comprehensive introduction to the topic for anyone preparing to develop their knowledge in this field. You will learn about Forensic Investigations, the seizure and capture of data storage devices, as well as any analysis techniques used by professionals.
Module 1: Building a Secure Organisation
Module 2: A Cyber Security Policy and Cryptography Primer
Module 3: Solving Key Distribution Issues with Asymmetric Encryption
Module 4: Ensuring Integrity with Hashes
Module 5: Assessing Traditional Static Password Schemes
Module 6: Evaluating Strong Authentication Methods and Authenticating Hosts
Module 7: Preventing System Intrusions and Discovering System Vulnerabilities
Module 8: Encrypting Files for Confidentiality
Module 9: Hardening the Operating System
Module 10: Scanning for Vulnerabilities and Reducing DoS Attacks
Module 11: Deploying Firewalls to Control Network Traffic
Module 12: Protecting Web Services and Applications
Module 13: Threats from the LAN and Confidentiality on External Connections
There are no formal prerequisites in this Introduction to System and Network Security training course.
This Introduction to System and Network Security course is designed for anyone who wants to gain in-depth knowledge about the system and network security and gain the skills to secure networks.
Network Security safeguards data and networks from intrusions, breaches, and other dangers. It is crucial to guard client information, keep shared data secure, provide reliable network performance and access, and protect from cyber threats. A well-developed network security solution decreases expenses and protects organisations from price losses from data violations or other security incidents. Skills gained from this System and Network Security training course will help learners to achieve higher job posts such as Cyber Security Engineer, IT Security Analyst, Cyber Security Analyst, Cyber Security Consultant, Network Security Engineer, and many more. Adding Network Security as a skill in learners' profiles will surely help them climb the ladder of success in value and career opportunities.
Our 1-day Introduction to System and Network Security Training course aims to provide delegates with a comprehensive knowledge of system and network security. During this course, delegates will learn about preventing system intrusions and discovering system vulnerabilities. They will also learn about various essential topics such as eavesdropping, Trojan horse, Caesar cypher, data encryption standard, data integrity, social engineering attacks, IP address spoofing attacks, vulnerability assessment, packet-filtering router, sniffing the network, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training course and will help you get a complete understanding of this course.
This training will also cover the following concepts:
At the end of this Introduction to System and Network Security Training course, delegates will be able to deploy firewalls to control network traffic. They will be able to scan for vulnerabilities and reduce DoS attacks. They will also be able to remove unnecessary services, applications, and protocols.
If delegates want to pursue their career in the security sector, they can choose our other popular training courses such as Certified Cyber Security Professional (CCS-PRO), Cyber Security Awareness, Cyber Security Risk Management, and many other courses.
Introduction to Social Engineering
Social Engineering Types
Overview of Elicitation
Basics of Pretexting
Information Gathering Basics
Computer-Based and Physical Tools
Anyone who wishes to enhance their knowledge of social engineering can attend this course. Professionals who wish to learn how to secure systems from social engineering attacks can also attend this course.
There are no formal prerequisites for this course.
Social engineering refers to the art of manipulating people to gain access to confidential data for fraudulent purposes. It is a term used for a wide range of malicious activities accomplished through human interactions.
Because social engineering relies on human error rather than vulnerabilities in software and operating systems, it requires a different approach to traditional network security.
This Social Engineering course is designed to provide knowledge to defend against social engineering tricks. During this training, delegates will learn about various influencing techniques including reciprocity, scarcity, and likability.
They will also become familiarised with common elicitation techniques, as well as pretexting. By the end of the course, you will understand the various computer-based and physical tools of social engineering, including the Social Engineering Toolkit (SET).
Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on 01344203999 or Enquire.
You won't find better value in the marketplace. If you do find a lower price, we will beat it.
We are accredited by PeopleCert on behalf of AXELOS
Flexible delivery methods are available depending on your learning style.
Resources are included for a comprehensive learning experience.
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water