Cyber Security and Data Security Courses



Similar documents
Small businesses: What you need to know about cyber security

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

2015 Information Security Awareness Catalogue

developing your potential Cyber Security Training

IS INFORMATION SECURITY POLICY

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Small businesses: What you need to know about cyber security

Sub-section Content. 1 Formalities - Post title: Risk Consultant - Reports to: Head of Group Risk - Division: xxx - Location: xxx

Cyber Essentials Scheme

Human Resources Manager 12 month fixed term contract

Policing Together. A quick guide for businesses to Information Security and Cyber Crime

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

A practical guide to IT security

Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

JOB DESCRIPTION. Procurement and Contract Management Advisor. Commercial Procurement, Property, and Contracts Team

Technical Testing. Network Testing DATA SHEET

PCI COMPLIANCE GUIDE For Merchants and Service Members

Information Technology

INFORMATION SECURITY TESTING

Lot 1 Service Specification MANAGED SECURITY SERVICES

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour

Western Australian Auditor General s Report. Information Systems Audit Report

Job Description. Service Desk Technician. Operations Team Leader

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

I S O I E C I N F O R M A T I O N S E C U R I T Y A U D I T T O O L

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

Aberdeen City Council IT Security (Network and perimeter)

Cyber Security Management

Reputation. Further excellence. business continuity. risk management. Data security

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

SUPERVISOR, SERVICE DESK (Existing position)

Procurement Policy Note Use of Cyber Essentials Scheme certification

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

NETWORK SECURITY GUIDELINES

EHS Privacy and Information Security

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Network Security & Connection Policy

Data Access Request Service

Health and Safety Training from Bury College Business Solutions

External Supplier Control Requirements

Cybersecurity Best Practices

A Cyber Security Integrator s perspective and approach

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

A Guide to the Cyber Essentials Scheme

Creating a Culture of Cyber Security at Work

SOCIAL MEDIA POLICY. Introduction

THE HUMAN COMPONENT OF CYBER SECURITY

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013

IT change management policy

The Business Value of Managed Security Services

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Connect Smart for Business SME TOOLKIT

Cyber Security - What Would a Breach Really Mean for your Business?

Thales Pricing Schedule for Vulnerability Assessment and Penetration Testing

KEY STEPS FOLLOWING A DATA BREACH

HIPAA Security Balancing Security & Costs

Resilience and Cyber Essentials

Cyber security guide for boardroom members

University of Sunderland Business Assurance Over-arching Information Governance Policy

Cybercrime: risks, penalties and prevention

ICT Security Policy for Schools

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Chief Information Officer

Service Schedule for Business Lite powered by Microsoft Office 365

Third Party Security Requirements Policy

HACKED: Data Breach Scenario

InfoSec Academy Application & Secure Code Track

Service Definition Document Microsoft Dynamics CRM Training

Some thoughts about cloud computing risks. Andris Soroka 28 th of January, 2015 Riga, Latvia

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

Business Case. for an. Information Security Awareness Program

The Human Component of Cyber Security

Qualification details

Information Security Awareness Training and Phishing

Student Selection criteria outlining assessment requirements to ensure aptitude of participants to course

ITU-IMPACT Training and Skills Development Course Catalogue

How To Choose A Cloud Service From One Team Logic

St Hugh s School. Remote Access Policy

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Accelerating PCI Compliance

Cybersecurity. Are you prepared?

Software as a Service (SaaS) Online HR

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

How to Deploy the Survey Below are some ideas and elements to consider when deploying this survey.

CGI Cyber Risk Advisory and Management Services for Insurers

ONLINE RECONNAISSANCE

Controls over CIS. Ryan O Halloran, Senior Manager KPMG Hobart. TAO Client Information Session. May 2015

Training Opportunities for Local Authority Staff

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Information security controls. Briefing for clients on Experian information security controls

Service Schedule for BT Business Lite Web Hosting and Business Lite powered by Microsoft Office 365

Certification Programs

How To Write A Cross Industry Cyber Security Strategy

Cyber Essentials Questionnaire

Cloud Software Services for Schools

Transcription:

dsdsds Cyber Security and Data Security Courses Overview 01905 317173 @FriendlyNerdUK www.friendlynerd.co.uk

Cyber Basics (half-day) To provide a basic foundation of cyber security knowledge for general staff within a company or organisation To enable attendees to understand the key concepts of cyber security and how they apply to their own day-to-day activities To raise awareness of the impact of cyber incidents and the reasons why they occur. To provide basic advice good practice to prevent cyber incidents from an enduser perspective This course is aimed at all staff within a company and provides basic guidance and advice on how to look after a company s data and prevent cyber incidents from occurring. The course would fit well as part of an organisation s security awareness programme and can be customised to comply with the security policy of a particular organisation. Groups involved and methods used Impact of cyber incidents Part 2 Cyber Basics how to keep secure day-to-day Passwords Phishing and social engineering Secure configuration Anti-virus and malware Wi-Fi and mobile working Updates and patches Part 3 Scenarios Short scenarios where attendees apply their learning to typical day-to-day situations The course assumes a generalist and non-technical audience. No prior experience or knowledge of cyber security is required.

Cyber Security for Managers and Decision Makers (full-day) To enable managers and leadership teams to make decisions on how to change an organisations business processes to reduce the risk of cyber incidents To enable attendees to understand the key ideas of risk, data security and the essential technical controls that enable cyber security To assist the development of a cyber security strategy and information security policy for an organisation To provide a background on how to develop a security awareness campaign for staff and how to deal with cyber incidents This course provides simple, practical advice on the steps that should be taken to prevent cyber incidents within an organisation from a strategic and operational perspective. The course is appropriate for managers, leaders and decision makers across business areas. It would also suit those who are part of an advisory board and need to set strategic direction. The course is a mix of formal training and a short interactive exercise where attendees are encouraged to apply their learning in a number of scenarios. Groups involved and methods used Impact of cyber incidents on organisation Part 2 A strategic approach to cyber security How to set a strategic direction on cyber security How to assess and measure cyber risks Creating an information security policy and legislationlegislation Part 3 Operational measures to decrease risk How to identify and categorise your data Developing security awareness and good practice in staff Key technical measures to prevent cyber incidents Certifying your information security compliance Part 4 Scenarios Short group scenarios on the above to enable attendees to apply their learning The course covers cyber security topics at a leadership/strategic level and assumes candidates have a working knowledge of their organisation, the types of data held and activities carried out. Detailed knowledge or experience of cyber security is not required.

Developing a Security Awareness Programme (half-day) To enable HR managers, IT managers and leaders to develop a data security culture within their organisation through a security awareness programme To enable attendees to understand the elements that make a successful security awareness programme and to be able to apply these to their own organisation To enable attendees to understand the key concepts of cyber security and the basic security messages their programmes should provide to their staff The course takes you through the process of developing your own security awareness campaign within your organisation, including: How to decide on appropriate security messages and how to relate to policy How to get the message across (methods to use, frequency of messages, focus on staff joiners/leavers) How to target messages to different audiences(office staff, warehouse staff, finance, suppliers, contractors) How to measure impact The course would be well suited to HR managers, IT managers and department heads, or anyone who has a remit to develop security awareness across an organisation. Brief overview of cyber security and the role staff play to keep data secure Part 2 Developing a data security culture within your organisation Messaging what are you trying to communicate? How to relate to company policy do you need to create a policy? Who are your audience and why? What methods can be used to communicate Which are most cost-effective Ongoing messages versus event-timed messages (joiners/leavers/contractors) Linking the programme to training basic cyber skills for staff Measuring impact what can be measured? Part 3 Scenarios Short scenarios where attendees apply their learning to their own organisation The course assumes a non-technical audience. No prior experience or knowledge of cyber security is required.

An Introduction to Data Protection (half-day) To provide general employees with a background and understanding of the basics of data protection and how to apply them to everyday work situations To enable attendees to understand the key concepts of personal and sensitive personal data, data controllers and data processors, as well as the key principles of data protection To assist attendees to understand the impact of data breaches and provide basic advice on how to help keep company and personal data safe through datafocussed good practice To understand the changes to Data Protection legislation coming into effect with the EU General Data Protection Regulation This half-day course provides the knowledge needed to understand the basics of data protection within an organisation. It is appropriate for anyone who comes into day-to-day contact with personal or sensitive data within an organisation and provides a foundation of knowledge to enable data to be handled appropriately. The course is suitable to be used as part of an employee awareness campaign and can be customised for the particular rules and practices of a commissioning organisation. The course is a mix of formal training and a short interactive exercise where attendees are encouraged to apply their learning in a number of scenarios. Part 1 Data protection in practice What is personal data and what is sensitive personal data? Key terms and their meaning Principles of data protection Changes to come from European-wide legislation How to keep data safe data security basics and good practice What happens when data protection goes wrong? What is a data breach and what should you do if you think one has occurred? Part 2 Scenarios Short scenarios where attendees apply their learning to example situations in a typical role The course assumes a generalist audience. No prior knowledge of data protection is required.