Training Services - 8 Topics:


Topic 1: Introduction to Cybersecurity

  • What cybersecurity is and why it matters

  • Definition of Risks, Threats and Cyber Attacks

  • Common cyber threats and Mitigation Controls (malware, phishing, ransomware, social engineering, MITM)

  • The importance of personal and business cybersecurity

  • Overview of cybersecurity roles and career paths

Topic 2: Essential Cyber Hygiene Practices

  • What is Cyber Hygiene Practice

  • Creating strong passwords and using multi-factor authentication (MFA)

  • Safe browsing habits and recognizing phishing attacks

  • Importance of software updates and patch management

  • Securing devices: antivirus, firewalls, and encryption

Topic 3: Networks and Online Security Basics

  • How the internet and networks work (basic concepts: IP, DNS, VPNs)

  • Securing Wi-Fi networks at home and work

  • Understanding HTTPS and secure website browsing

  • Introduction to VPNs and when to use them

Topic 4: Introduction to Cybersecurity Tools

  • Overview of basic cybersecurity tools (firewalls (types), antivirus, password managers)

  • How to identify and respond to a cyber attack

  • Introduction to ethical hacking and penetration testing

  • Introduction to penetration testing tools – Nessus, Nmap, OpenVAS, Kali

Topic 5: Governance, Risk, and Compliance (GRC)

      •    Overview of GRC and its importance in cybersecurity
      •    Understanding the principles of Governance in cybersecurity
      •    What is Risk Management? Identifying, assessing, and mitigating cybersecurity risks
      •    Compliance standards and regulations (GDPR, HIPAA, PCI-DSS, etc.)
      •    Role of audits, assessments, and reporting in cybersecurity
      •    Introduction to frameworks (NIST, ISO 27001, COBIT) and their application
      •    Developing and implementing security policies and procedures

Topic 6: Incident Response

    •    What is an incident and why a structured response is crucial
    •    Stages of Incident Response (Preparation, Identification, Containment, Eradication, etc) 
    •    Building an incident response plan and team
    •    Tools and techniques used in incident detection and containment
    •    How to communicate during an incident (internal and external communication)
    •    Post-incident activities: Root cause analysis and improving security posture

Topic 7: Network Security

   •    Introduction to network security and safeguarding data and infrastructure
   •    Basic network architecture and protocols (routers, switches, firewalls, DNS, etc.)
   •    Types of network security threats (DoS, DDoS, MITM attacks, etc.)
   •    Network security controls: Firewalls, IDS/IPS, VPNs, and Segmentation
   •    Encryption in transit: TLS, IPSec, and VPN protocols
   •    Network monitoring and intrusion detection/prevention systems (IDS/IPS)
   •    Best practices for securing networks (segmentation, access control, & zero trust)

Topic 8: Digital Forensics

  •   What is Digital Forensics and its role in cybersecurity
  •    Basic principles of evidence collection and handling in digital forensics
  •    Types of digital evidence: Data, logs, devices, and network traffic
  •    Introduction to forensic tools and software (e.g., EnCase, FTK, Autopsy)
  •    Forensic analysis process: Imaging, preservation, and examination
  •    Analysing incidents through forensic investigation: Malware, breaches, and fraud
  •    Legal and ethical considerations in digital forensics (privacy, chain of custody,e.t.c)

£50 per 1 hour session. Please reach out by completing the Contact Us form for more details

Offering online Cybersecurity training for beginner to advnanced levels - GET IN TOUCH FOR MORE