Is This for You?
This is an intermediate-level security course for working or aspiring IT professionals seeking to deepen their understanding of best practice in data, cloud, and information security.
This is an intermediate-level security course for working or aspiring IT professionals seeking to deepen their understanding of best practice in data, cloud, and information security.
To mitigate cyber, data, cloud, and information security risks, you need solid knowledge of the complete network security process, from network design to deployment to continuous monitoring. In this course, you’ll explore a variety of network security concepts and techniques for mitigating security risks.
Effective cybersecurity risk management requires intricate knowledge of day-to-day IT security risks, network vulnerabilities, and cyber attacks. You’ll learn about cybersecurity breaches and how best to prevent them. You’ll explore commonly used techniques to assess data security and you’ll learn how to protect your organisation’s data.
You’ll also learn how to manage risks from both external and internal sources. You’ll explore the policies, procedures, standards, and guidelines that underpin effective information security for an organisation.
You’ll learn best practices for security breach incident management. And you’ll explore business continuity planning to ensure that your organisation functions smoothly during an unplanned incident or disaster.
Module 1 – Managing Network & Infrastructure Security Risks
Module 2 – Managing Physical Security Risks
Module 3 – Cyber Security Risks
Module 4 – Managing Security in a Hybrid Workplace
Module 5 – Managing Social Engineering Risks
Module 6 – Information, Cloud & Data Security Risk Considerations
Module 7 – Managing Information, Cloud & Data Security Risks
Module 8 – Handling Natural Threats
Module 9 – Managing Risks from Internal Stakeholders
Module 10 – Maintaining a Secure Workplace
Module 11 – Information Security Governance
Module 12 – Managing the Incidents
Module 13 – Maintaining Business Continuity
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
This course is designed to deepen your understanding of IT security risks and how to prepare for and respond to them.
Security+ course completion or certification or equivalent background and experience.
Wherever possible our training is tailored to your needs. The cost of our training programmes depend on the course(s) you choose and varies according to duration and breadth. Rest assured we have a number of payment options available to ensure the cost of training is affordable and can be worked alongside your other financial commitments. Common ways people fund their training include: –
Requesting funding from your employers needn’t be a daunting task. Many employers support and encourage their employees with their professional development and consider it a worthwhile investment to fund any training required.
What we can help with:
There may be the opportunity to apply for funded grants that can help towards the cost of training. These include the Skills Development Scotland ITAs and the ReAct programme in Wales. All schemes will have different terms and conditions that will need to be met in order to qualify for a grant and these are managed by each individual centre.
We’d recommend you speak to a Course Advisor in your local centre to find out whether they are registered to offer any such schemes and discuss your requirements further.
* Terms and Conditions apply. Speak to a Course Advisor for full information on the options available to you.
This course will be helpful to anyone who has or seeks responsibility for an organisation’s data, cloud, and information security.