Training Services - 8 Topics:
Topic 1: Introduction to Cybersecurity
What cybersecurity is and why it matters
Definition of Risks, Threats and Cyber Attacks
Common cyber threats and Mitigation Controls (malware, phishing, ransomware, social engineering, MITM)
The importance of personal and business cybersecurity
Overview of cybersecurity roles and career paths
Topic 2: Essential Cyber Hygiene Practices
What is Cyber Hygiene Practice
Creating strong passwords and using multi-factor authentication (MFA)
Safe browsing habits and recognizing phishing attacks
Importance of software updates and patch management
Securing devices: antivirus, firewalls, and encryption
Topic 3: Networks and Online Security Basics
How the internet and networks work (basic concepts: IP, DNS, VPNs)
Securing Wi-Fi networks at home and work
Understanding HTTPS and secure website browsing
Introduction to VPNs and when to use them
Topic 4: Introduction to Cybersecurity Tools
Overview of basic cybersecurity tools (firewalls (types), antivirus, password managers)
How to identify and respond to a cyber attack
Introduction to ethical hacking and penetration testing
Introduction to penetration testing tools – Nessus, Nmap, OpenVAS, Kali
Topic 5: Governance, Risk, and Compliance (GRC)
• Overview of GRC and its importance in cybersecurity
• Understanding the principles of Governance in cybersecurity
• What is Risk Management? Identifying, assessing, and mitigating cybersecurity risks
• Compliance standards and regulations (GDPR, HIPAA, PCI-DSS, etc.)
• Role of audits, assessments, and reporting in cybersecurity
• Introduction to frameworks (NIST, ISO 27001, COBIT) and their application
• Developing and implementing security policies and procedures
Topic 6: Incident Response
• What is an incident and why a structured response is crucial
• Stages of Incident Response (Preparation, Identification, Containment, Eradication, etc)
• Building an incident response plan and team
• Tools and techniques used in incident detection and containment
• How to communicate during an incident (internal and external communication)
• Post-incident activities: Root cause analysis and improving security posture
Topic 7: Network Security
• Introduction to network security and safeguarding data and infrastructure
• Basic network architecture and protocols (routers, switches, firewalls, DNS, etc.)
• Types of network security threats (DoS, DDoS, MITM attacks, etc.)
• Network security controls: Firewalls, IDS/IPS, VPNs, and Segmentation
• Encryption in transit: TLS, IPSec, and VPN protocols
• Network monitoring and intrusion detection/prevention systems (IDS/IPS)
• Best practices for securing networks (segmentation, access control, & zero trust)
Topic 8: Digital Forensics
• What is Digital Forensics and its role in cybersecurity
• Basic principles of evidence collection and handling in digital forensics
• Types of digital evidence: Data, logs, devices, and network traffic
• Introduction to forensic tools and software (e.g., EnCase, FTK, Autopsy)
• Forensic analysis process: Imaging, preservation, and examination
• Analysing incidents through forensic investigation: Malware, breaches, and fraud
• Legal and ethical considerations in digital forensics (privacy, chain of custody,e.t.c)
£50 per 1 hour session. Please reach out by completing the Contact Us form for more details
Offering online Cybersecurity training for beginner to advnanced levels - GET IN TOUCH FOR MORE