This course profiles the modern way to fight cybercrime and the ever present need to have talented and diligent employees equipped with smart and reliable information technology tools. It is seen today that there is a requirement to remain vigilant of an enemy that is global in reach, technologically mature, and communication savvy. In the wake of catastrophic events like September 11th and the ever-evolving national security and criminal threats, there are lessons to be learned, changes to be made, courses to correct and new problems to solve. To keep pace with these events this course will develop skills to keep ahead of the criminal fraternity.
This course is run by the Centre for Study of Organised Crime which has a broad range of continuing professional development (CPD) short courses. These are accredited by University of Buckingham in the form of certificate of attendance
Preparing for Cyber Security Risks | This module covers the different risks and likelihood of damages that could occur as the result of a cyber security attack and outline how to prepare and protect yourself and your organisation from this. |
Keeping Your System Secure | This section was designed to help learners understand system changes and storage, access authorisation and updates and responsibities to keep cyber security intact. |
Building Your Network’s Defence | We delve into how a cyber-attack may occur and the different types of attack. Understanding these can help learners build the defence against them. |
Controlling Access to Data | We look at how a network is protected by ensuring that the right people have the right access at the right time. |
Protecting Against Risk at Home and Work | The aim of this module is to increase the learner’s awareness of cyber-attacks and the steps one should take to ensure that both employee and employer benefit from the maximum protection available. |
Effective Incident Prevention and Response | We define security incidents and help learners understand how to react in certain circumstances to ensure the integrity and sustainability of the network. |
Maintaining Anti-malware Devices | We take a look at what malware is and how the many different types can impact your network. |
Establishing a Monitoring Strategy | This section outlines how organisations monitor online activity, why it is necessary, what is monitored and what can go wrong if not implemented. |
Removable Media on the Corporate System | This module will help learners appreciate their responsibility in protecting the data held by their organisations by explaining where data is held and how to safely use removable devices. |
Mobile Working Policies | We outline the additional risks that working remotely brings for cyber security and the role of social engineering in cyber-attacks. |
This cyber security training course is aimed at employees who use devices to store data or connect to the internet in their day-to-day role. This course will help employees protect their organisations from cyber-crimes.
—
Managing Director
Managing Director
Director of Financial Pathways
Director of Financial Pathways
Senior Police Practice Tutor
Senior Police Practice Tutor