Speak to our team now +44 (0)1737 821590

Cyber Security demystified

A 1 day training course

Cyber Security demystified training course description

The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Recognise the different types of attack.
  • Describe the attacks that can be made against information systems.
  • Describe the counter measures available.

Cyber Security demystified training course details

Who will benefit:
Non-technical staff working with computers.
Prerequisites:
None.
Duration:
1 day

Training approach

This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.

Overall ratings for this course:

Course review


"Hard concepts were explained very simply."
J. S., Framestore CFC
"Excellent presentation - very good course structure."
B. M., London Internet Exchange

Cyber Security demystified training course contents

What is Cyber Security?
Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response.

Attacks
Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering.

Countermeasures
Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity.

Cyber security standards
ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online