Chris Ward is one of the world’s foremost authorities on Cybersecurity.… why…
The courses are aimed at CEO's, CFO's, Business Owners and Managers who want to protect their intellectual property and clients personal data from being exploited.
Cyber Security Skills
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method developed by the Carnegie Mellon University, Pittsburgh USA helps you identify all the critical risk to your business.
The OCTAVE Allegro™ approach provides the Public and Private Sectors a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors' strategic objectives and risk tolerances.
The modules in each course are intuitive and supply workers with approved Continuous Professional Education credits that can be used for annual certification requirements to professional bodies. Except for the Cyber Awareness course, the other courses and credits are internationally recognised and authorised through Carnegie Mellon University Software Engineering Institute.
Introduction to Cybersecurity for CEO's - FREE
The purpose of this course is to highlight for CEO's and business owners what and why they need to implement cybersecurity for their business. Cybersecurity is way more than installing some virus protection and if not implemented could cost the business everything.
Cyber Risk Assessment
Cyber Security for Management and Team Leaders
This course enables workers to acquire a skill that most managers do not have and gives a competitive advantage compared to other job applicants. The course improves management skills by focusing on operational risks to information assets and learn to view risk assessments in the context of the organisation's strategic objectives and risk tolerances.
Creating a Cyber Battle Team (CSIRT)
The course is designed for managers and project leaders who have been tasked with creating your Cyber Battle Team. In technical terms, this course is called creating a Computer Security Incident Response Team (CSIRT). This course provides a high-level overview of the critical issues and decisions that must be addressed in establishing a Cyber Battle Team.
As part of the course, staff will develop an action plan that can be used as a starting point in planning and implementing your Cyber Battle Team. They will know what types of resources and infrastructure needed to support a team. Additionally, you will identify policies and procedures that should be established and implemented when creating a CSIRT.
Cyber Awareness Training for Working at Home Workers (All Employees)
This course helps business to keep their remote workforce secure by identifying threats and improving their cyber intelligence.
The aim of this course is to teach your staff how they can keep their personal and company data safe from breaches, ransomware, spams, and more.
Cyber Awareness Training for Virtual Assistants
Virtual assistants work with the business, helping your staff to hit their targets in a timely fashion, streamline operations, and keep pushing business objectives forward.
Virtual assistants often have access to not only the enterprise's assets but client's data as well. They are given access to platforms and software as they are a part of the system. If they are not aware of the crucial importance of following safety protocols to the teeth and the threats lurking around, they will only become a threat to your security.
Cyber Essentials for All Staff
Training your first line of defence... staff.
The non-technical foundation level course is aimed at helping workers to understand the importance of protecting the company and personnel information. The course also shows how to identify traps that may lead to a compromise or security breach.
Cyber Awareness for Businesses
This informative course teaches employees the value of being vigilant and techniques for protecting the enterprise from a security breach. The course educates employees about how they can identify potential cyber threats and how they can avoid them.
Managing a Computer Security Incident Response Team (CSIRT)
This course will help you gain a pragmatic view of the issues you can face now and in the future—so that your teams can be prepared for them.
Deploying a Cyber Battle Team (CSIRT)
Incident Handling Fundamentals
This course is for workers who have little or no incident handling experience. It provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work. It is recommended to those new to incident handling work. You will have the opportunity to participate in sample incidents that you might face on a day-to-day basis.
The course enables workers to realise the importance of having and following pre-defined CSIRT policies and procedures. Workers will understand the technical issues relating to commonly reported attack types and perform analysis and response tasks for sample incidents. You will apply critical thinking skills in responding to incidents and identify potential problems to avoid while taking part in CSIRT work.
The course is designed to provide insight into the work that an incident handler may perform. It will give an overview of the incident handling arena, including CSIRT services, intruder threats, and the nature of incident response activities.