The objective of the course is to provide a comprehensive but necessarily high level overview across industry standard technology and platforms, illuminating the technology and its specific cyber governance, risk and assurance challenges without technically challenging the learner to hands-on labs.
The course takes the learner back to computer basics to build the individuals understanding common technology platforms through to the network layer and on via virtualisation technologies, cloud systems, telecoms and modern communications and finishing with an insight into the world of protective monitoring, challenges and pitfalls of security events logs and analysis. Common methods of attack provides the learner with an insight into many of the most popular attack vectors today. Closing the third day with a module focused on the benefits and pitfalls of encryption.
Day four begins with the cyber law and the context in which security practitioners and organisations have to operate within. Each of us has a digital footprint and the technology we use within our enterprise as an attack surface, the next module joins these two principles and explains the challenges for assurance around leaky data. During the remainder of day four and five we introduce the layered cyber concepts and the deeper governance required throughout the entire lifecycle covering a number of specialist areas essential to the rounded security practitioner.
Each day provides insight into the technical subject matter with the crucial security subtext. Knowledge check exercises, where delegates work in groups to discuss and provide solutions to scenarios offering an explanation with a rationale in each instance of why this is important from a security assurance perspective.
During the delivery we will provide the delegates with access to recorded video demonstrations of the technical subject matter, which will enhance the learners experience whilst preserving any technical confidence as there are no requirements for the learner to undertake any 'hands-on' labs.
IISP Skills Alignment
This course is aligned to the following Institute of Information Security Professionals (IISP) Skills. More details on the IISP skills framework can be found here.
IISP Skills: A1, A2, A6, A7, B1, B2, C1, C2, D1, D2, E1, E2, E3, F2, G1
Continuous Professional Development (CPD)
CPD points can be claimed for NCSC accredited courses at the rate of 1 point per hour of training for NCSC accredited courses (up to a maximum of 15 points).