Cyber Security Training Course: All you need to know
Cyber Security Training Course Overview
Who should attend
Cyber Security Course Programme
|9.30 - 9:45||Refreshments and Registration|
|9.45 - 10:00||Welcome Aims & Goals for the day|
|10.00 - 10.30||Exercise: The Value of Data: Value, Risk and Trust, Cyber Security and Data Protection. Scenario: What does data security look like in your business - let’s map it out?|
|10.30 - 11:00||Understanding the language
|11.30 - 11:45||Refreshments|
|11:45 - 12.30||Threats of the modern workplace
Exercise: social engineering, phishing, hacking, insider threat
|12.30 - 13.15||Technical and Organisational Security, Multi Factor Authentication and Encryption
|13.15 – 14.00||Lunch and Refreshments|
|14.00 – 14:30||Standards, laws and regulations (ISO, GDPR, PCI DSS)|
|14.30 - 15.15||Case Scenario: Incident Response
Exercise: What is a data breach?
Case Scenario and good practice Exercises
|15.15 – 15.30||Refreshments|
|15.30 – 16.15||Exercise: Security culture
Case Scenario: Education and Awareness.
Importance of policy and communication.
|16.15 – 16.30||Close and finish|
Cyber Security Virtual Training Dates
Cyber Security Classroom Training
A really good course that helped me connect the basics of Data Security with my work and personal life. Would highly recommend.Managing Director
Really good course and the trainer was highly knowlegable.Data Protection Officer
Who are our Caldicott Guardian Trainers?
Ralph has spent nearly two decades working at the intersection of privacy, security and risk management. He believes good information governance adds business value to achieve business objectives and return on investment.
Thom is a strategic Information security Consultancy that focuses on Virtual CISO, strategic business alignment and public speaking/advocacy for hire.As Chief Information Security Officer of Publicis Groupe, Thom was responsible for all aspects of information security risk and compliance as well as managing the Groupe Information Security Programme. Additionally, the role was responsible for business continuity capabilities across the Groupe’s global operations. Having successfully built security and IT programmes from the ground up Thom brings an often opinionated and forward-thinking view of security risk, both in assessments and management, but is able to do so with humour and pragmatism (mostly). An international public speaker and award winning security blogger, Thom contributes to a number of industry blogs and publications.
Leadership Through Data provide bespoke training courses that are custom made to your needs. Bespoke courses provide an exclusive learning and development opportunity which is cost effective.
All prices include the attendance of 15 delegates, a course workbook, additional reading, slide handouts, an LTD delegate folder, a pen and a CPD certificate. If booked in advance, we offer a 4 week after care package.
If you did not find the course you are looking please contact us and we can discuss and design the right course for you. For a no obligation quote, email firstname.lastname@example.org or call 07931566007 or 01206 807267