Kingsley Institute of Management

Cyber Security/Cyber Crime CSOC

Overview

This course profiles the modern way to fight cybercrime and the ever present need to have talented and diligent employees equipped with smart and reliable information technology tools.  It is seen today that there is a requirement to remain vigilant of an enemy that is global in reach, technologically mature, and communication savvy.  In the wake of catastrophic events like September 11th and the ever-evolving national security and criminal threats, there are lessons to be learned, changes to be made, courses to correct and new problems to solve.  To keep pace with these events this course will develop skills to keep ahead of the criminal fraternity.

Course Aims

  • Identify the risks associated with cyber activity
  • Explain how to protect your network from attack using anti-malware defences
  • State the process for responding to a cyberattack or a suspicious incident
  • Understand the levels of access to data and your restrictions within these
  • Identify additional security measures required for working from home or remote locations
  • Explain the risks associated with the use of removable media and how to maintain their security
  • Implement best practice cyber security guidance into your work, as set out by industry standards and your organisations policies
  • Identify the weak points in your network and devices, and therefore where you need to action changes

This course is run by the Centre for Study of Organised Crime which has a broad range of continuing professional development (CPD) short courses. These are accredited by University of Buckingham in the form of certificate of attendance

Content

Preparing for Cyber Security RisksThis module covers the different risks and likelihood of damages that could occur as the result of a cyber security attack and outline how to prepare and protect yourself and your organisation from this.
Keeping Your System SecureThis section was designed to help learners understand system changes and storage, access authorisation and updates and responsibities to keep cyber security intact.
Building Your Network’s DefenceWe delve into how a cyber-attack may occur and the different types of attack. Understanding these can help learners build the defence against them.
Controlling Access to DataWe look at how a network is protected by ensuring that the right people have the right access at the right time.
Protecting Against Risk at Home and WorkThe aim of this module is to increase the learner’s awareness of cyber-attacks and the steps one should take to ensure that both employee and employer benefit from the maximum protection available.
Effective Incident Prevention and ResponseWe define security incidents and help learners understand how to react in certain circumstances to ensure the integrity and sustainability of the network.
Maintaining Anti-malware DevicesWe take a look at what malware is and how the many different types can impact your network.
Establishing a Monitoring StrategyThis section outlines how organisations monitor online activity, why it is necessary, what is monitored and what can go wrong if not implemented.
Removable Media on the Corporate SystemThis module will help learners appreciate their responsibility in protecting the data held by their organisations by explaining where data is held and how to safely use removable devices.
Mobile Working PoliciesWe outline the additional risks that working remotely brings for cyber security and the role of social engineering in cyber-attacks.

Who This Course is for

This cyber security training course is aimed at employees who use devices to store data or connect to the internet in their day-to-day role. This course will help employees protect their organisations from cyber-crimes.

Cost

Course Team

Professor David M J Graves

David M J Graves

Managing Director

Gerald Doyle

Director of Financial Pathways

Dr. Chris Allen

Senior Police Practice Tutor

Book a place