• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1 Educators providing Computing & IT courses about Cyber Security in Glasgow

Technology Coaching

technology coaching

5.0(21)

Glasgow

At Technology Coaching, we are passionate about empowering small business owners and professionals to thrive in the digital age. Founded with a vision to make technology accessible and actionable, we specialise in designing, developing, and delivering interactive learning experiences that drive results. Our core services include hands-on workshops, tailored digital solutions, Small Business Sessions, and our flagship CPD-accredited courses that help businesses unlock their full potential. From mastering social media content creation to navigating the complexities of automation, our offerings are designed to equip you with the essential skills needed for success. Our Small Business Sessions provide a hands-on, practical approach to help entrepreneurs and small business owners address their unique challenges. Whether you need guidance on digital marketing, technology integration, or business strategy, these sessions offer personalised support to drive your business forward. It’s our mission that every person develops a complete digital mindset based on six core competencies: Innovation, Web Presence, Social Media Marketing, AI & Automation, Cyber Security, and Making Decisions With Data. These competencies are at the heart of everything we do, ensuring that our clients are not just up-to-date but ahead of the curve in the digital world. We also offer “Tackle Your Tech,” a flexible service that provides you with dedicated support to conquer your digital challenges. Whether it’s website updates, video editing, or social media strategy, we ensure your business stays ahead in the ever-evolving digital landscape. Our Digital Dominators Series is another highlight, featuring interactive online sessions with expert speakers who share insights on topics crucial to your business growth. Each session is crafted to inspire, educate, and connect you with actionable strategies that you can implement immediately. Led by our founder, Sooz Young, Technology Coaching stands out for its engaging and professional approach. We believe in taking action, being visible, and showing up where it matters most—online. Whether you’re a small business owner looking to upskill or a corporate professional seeking innovative solutions, we are here to help you achieve your goals. Join us at Technology Coaching, where we make technology work for you.

Courses matching "Computing & IT"

Show all 1

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995