CyberSecurity Foundation

Short course

Inhouse

£ 201-500

Description

  • Type

    Short course

  • Level

    Beginner

  • Methodology

    Inhouse

  • Duration

    2 Days

  • Start date

    Different dates available

The CyberSecurity Foundation course is developed to teach the basic information security concepts and techniques. The knowledge captured and communicated in this course can be immediately applied by organizations around the globe to ramp up to meet their legal obligations defined by newly introduced statutory and regulatory acts.The course consists of five primary modules that address NIST Critical Security Factors which are Identify, Protect, Detect, Respond, and Recover. In addition, the course introduces GAP Assessment and four tiers of capability and maturity created to help organizations plan their CyberSecurity roadmap.The RESILIATM Practitioner course audience includes all teams across the Business, IT and Risk functions, including:

Facilities

Location

Start date

Inhouse

Start date

Different dates availableEnrolment now open

About this course

Upon completion of this course, you will be able to:* Define business environment and plan for governance, risk, and compliance* Establish access control, raise awareness, and choose protective technologies* Monitor actively for anomalies and events* Implement a response plan and apply continuous improvement* Implement a recovery plan with communications and continuous improvement

* Risk, security or cyber security managers* Business process owners* Business risk managers* Regulatory compliance managers* Project managers* Individuals responsible for cyber security within an organization

RESILIATM Foundation Certification.

Participants in this course will obtain the following benefits:* Reduce risks and threats to the Confidentiality, Integrity, and Availability of the Enterprise’s CyberSecurity Assets and System Resources by providing policies, practices and standards designed to mitigate or eliminate all known risks and threats.* Improve the effectiveness and efficiency of CyberSecurity Management by implementing a world class best practice and framework for consistent, concise security administration.* Improve effectiveness and efficiencies of the existing CyberSecurity mechanisms by formalizing new practices to monitor compliance and maintain sensitive data awareness.* Improve reassurance testing and validation outcomes by Internal Audit and External Auditors to further assure the Enterprise’s Investors, Board of Directors, and Executive Management Team that the Enterprise’s CyberSecurity Assets and System Resources are secure.* Reduce the likelihood of accidental incidents caused by Enterprise’s staff that can adversely affect the Enterprise’s reputation or liabilities by providing an ongoing CyberSecurity education and awareness program.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2018

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Risk
  • Java
  • Network security
  • IT risk
  • Python
  • IOS
  • IoT
  • Embedded programming
  • Java security
  • Embedded security

Teachers and trainers (1)

Bright  Solutions

Bright Solutions

Trainer

Course programme


#text-block-10 { margin-bottom:0px; text-align:left; }

Preliminary CyberSecurity Framework–Identify: Develop the organization’s knowledge of CyberSecurity to enable and empower management to address risk to organizational assets, people, information, software, hardware, telecommunications, and facilities. Key processes include:

* Business Environment
* Risk Management Strategy
* Governance
* Risk Assessment
* Asset Management

Preliminary CyberSecurity Framework–Protect: Design, test, and deploy appropriate safeguards that mitigate CyberSecurity threats to the organizations’ operations and services. Key processes include:

* Data Security
* Protective Technology
* Information Protection Processes and Procedures
* Access Control
* Awareness Training
* Maintenance

#text-block-11 { margin-bottom:0px; text-align:left; }

Preliminary CyberSecurity Framework–Detect: Design and implement effective tools that will actively monitor the organizations’ operations and services to identify events before they develop into a security incident. Key processes include:

* Anomalies and Events
* Security Continuous Monitoring
* Detection Processes

Preliminary CyberSecurity Framework–Respond: Plan, test, and operationalize CyberSecurity event and incident management processes. Train security teams to effectively engage CyberSecurity threats and test the organization’s response to events and incidents. Key processes include:

* Response Planning
* Communications
* Analysis
* Mitigation
* Improvements

Preliminary CyberSecurity Framework–Recover: Plan, test, and deploy recovery processes that will quickly return the organization to full operational capacity. Train employees designated to participate in the recovery team ensuring a smooth seamless transition from Cyber Security incidents to full operational capacity. Key processes include:

* Recovery Planning
* Improvements
* Communications

CyberSecurity Foundation

£ 201-500