Chris Ward is one of the world’s foremost authorities on Cybersecurity.… why…
The courses are aimed at CEO's, CFO's, Business Owners and Managers who want to protect their intellectual property and clients personal data from being exploited.
Cyber Security Skills
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method developed by the Carnegie Mellon University, Pittsburgh USA helps you identify all the critical risk to your business.
The OCTAVE Allegro™ approach provides the Public and Private Sectors a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors' strategic objectives and risk tolerances.
The modules in each course are intuitive and supply workers with approved Continuous Professional Education credits that can be used for annual certification requirements to professional bodies. Except for the Cyber Awareness course, the other courses and credits are internationally recognised and authorised through Carnegie Mellon University Software Engineering Institute.
Cyber Risk Assessment
Cyber Security for Management and Team Leaders
This course enables workers to acquire a skill that most managers do not have and gives a competitive advantage compared to other job applicants. The course improves management skills by focusing on operational risks to information assets and learn to view risk assessments in the context of the organisation's strategic objectives and risk tolerances.
In this course, participants learn to perform information security risk assessments. The approach provides organisations with a comprehensive methodology that focuses on information assets in their operational context.
Creating a Cyber Battle Team (CSIRT)
The course is designed for managers and project leaders who have been tasked with creating your Cyber Battle Team. In technical terms, this course is called creating a Computer Security Incident Response Team (CSIRT). This course provides a high-level overview of the critical issues and decisions that must be addressed in establishing a Cyber Battle Team.
As part of the course, staff will develop an action plan that can be used as a starting point in planning and implementing your Cyber Battle Team. They will know what types of resources and infrastructure needed to support a team. Additionally, you will identify policies and procedures that should be established and implemented when creating a CSIRT.
Managing a Cyber Battle Team (CSIRT)
The course provides the skills to manage Cyber Battle Teams or in technical term Computer Security Incident Response Teams (CSIRTs). The course takes a pragmatic view of the issues that they will face in operating an effective team.
The course provides insight into the work that the Cyber Battle Team staff may be expected to handle. The course also provides you with an overview of the incident handling process and the types of tools and infrastructure you need to be effective.
Technical issues are covered from a management perspective. You will gain experience with the type of decisions they might face regularly.
Deploying a Cyber Battle Team (CSIRT)
Incident Handling Fundamentals
This course is for workers who have little or no incident handling experience. It provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work. It is recommended to those new to incident handling work. You will have the opportunity to participate in sample incidents that you might face on a day-to-day basis.
The course enables workers to realise the importance of having and following pre-defined CSIRT policies and procedures. Workers will understand the technical issues relating to commonly reported attack types and perform analysis and response tasks for sample incidents. You will apply critical thinking skills in responding to incidents and identify potential problems to avoid while taking part in CSIRT work.
The course is designed to provide insight into the work that an incident handler may perform. It will give an overview of the incident handling arena, including CSIRT services, intruder threats, and the nature of incident response activities.
Cyber Essentials for All Staff
Training your first line of defence... staff.
The non-technical foundation level course is aimed at helping workers to understand the importance of protecting the company and personnel information. The course also shows how to identify traps that may lead to a compromise or security breach.
This course will ensure workers have up to date knowledge and help workers to:
- Gain a foundational overview of the various elements of cybersecurity
- Understand the importance of maintaining a safe presence on the internet
- Gain an understanding of what to protect when using the internet
- How to avoid becoming a target on the internet and introducing viruses and hackers into your business
Cyber Awareness Training for Working at Home Workers (All Employees)
This course helps business to keep their remote workforce secure by identifying threats and improving their cyber intelligence.
The aim of this course is to teach your staff how they can keep their personal and company data safe from breaches, ransomware, spams, and more.