Booking options
Price on Enquiry
Price on Enquiry
Delivered In-Person
Delivered at your location
UK & International Requests Considered
3 days
All levels
This course will provide those involved in raising cyber awareness for their organisations with a detailed overview of the nature and dynamics of cyber-space in terms of its impact upon personal and corporate security and reputation and how that impact can best be mitigated.
This course is aimed at a wide range of people since everyone at both a personal, government or business level are impacted by the connectivity of cyber-space to their daily lives. Thus, whilst it will be of specific relevance to any organisation for whom security issues caused or facilitated by staff members, it will be relevant for anybody who connects at any level to the cyber world. Thus, it would be of value to those working in law enforcement, Government, Private Sector and Education.
This course aims to increase and enhance delegates’ understanding of the various cyber threats which impact upon them and the organisations, sectors and regions in which they operate and provide them with the tools necessary to mitigate those threats at both a personal and organisational level. It assumes no prior knowledge of the subject but ensures through a high level of interactivity that delegates with any level of experience in the field will be able share and receive the collective knowledge of the group.
Technological threat environment including the centrality of computer systems and devices, data loss and critical infrastructure disruption
The information threat environment, including the dangers posed by social engineering (such as the systematic targeting of the users of social networks) and the introduction of mitigating behaviour regarding control of images posted online, the setting of appropriate privacy settings and the avoidance of the placement of personal details, particularly location, on the internet
The Internet as a cyber target, market and facilitator of crime including the organised crime market in information, identity theft including through malware attacks, cyber-dependent crime underpinned by Crime as a Service (CaaS) such as the use of malware (malicious software), cryptoware (e.g. ransomware) and consideration of the and Dark Web (i.e. illicit commodities sold through illegitimate means)
Cyber-bullying in terms of its nature, characteristics and impact (from loss of sleep to low self-esteem and in some cases suicide), mitigation (from simply not responding to contacting the Internet Service Provider, School authorities or the police), regulation and legislation
Cyber-Terrorism including the use of the internet (principally social media platforms) for recruitment, propaganda, communication and movement of finances
The nature and impact of digital disintegration whereby an increasing number of devices are connected online and an increasing number of complex transactions occur on those devices increasing the risk to the devices’ owners
Phishing attacks and how to recognise and respond to a common but potentially devastating security risk
A global training provider and consultancy that helps clients identify £millions in revenue loss and protect annual spend. We are a UK based company but op...