Is This for You?

This course is designed as an introductory-level information security course for anyone looking to develop an understanding of essential IT security concepts.

Award and Associated Qualifications

Awarded 15 CPD points upon successful completion

Start Date
Flexible
Study Type
In centre, online, or a combination
Training Type
course
Duration
15 hours

About This Course

This course is designed as an introductory-level information security course for anyone looking to develop an understanding of essential IT security concepts.

Continuing with the foundational elements of security begun in our CyberSecurity 101 course, in this second course, you’ll explore different ways organisations protect their information and systems from malicious activity.

You’ll start by learning best practices in intrusion prevention and move on to the fundamentals of penetration (pen) testing. From there, you’ll examine how organisations manage and analyse the results of their pen-testing activities.

COURSE CONTENT

  • Module 1 – Intrusion Prevention – Best Practices
  • Module 2 – Pen Testing Fundamentals
  • Module 3 – Pen Testing Awareness – Results Management

Download Course Packet

"*" indicates required fields

Accept*
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.

Aims and Objectives

In this second course in our series on the core elements of information security, you’ll explore the various ways organisations protect their information and systems from threats and malicious activity.

Pre-Requisites

While there are no formal pre-requisites for this course, it is the logical follow-on from our CyberSecurity 101 course.

Finance Options

Wherever possible our training is tailored to your needs. The cost of our training programmes depend on the course(s) you choose and varies according to duration and breadth. Rest assured we have a number of payment options available to ensure the cost of training is affordable and can be worked alongside your other financial commitments. Common ways people fund their training include: –

Self-Funded:

  • Flexible payment plans to help you spread the cost* available at many of our centres;
  • You could opt to pay upfront.

Company Funded:

Requesting funding from your employers needn’t be a daunting task. Many employers support and encourage their employees with their professional development and consider it a worthwhile investment to fund any training required.

What we can help with:

  • Providing a comprehensive training programme outlining learning outcomes
  • Tailored personnel letters
  • Communication with finance departments to arrange payment options (upfront or payment plan*).

Funding & Grants:

There may be the opportunity to apply for funded grants that can help towards the cost of training. These include the Skills Development Scotland ITAs and the ReAct programme in Wales. All schemes will have different terms and conditions that will need to be met in order to qualify for a grant and these are managed by each individual centre.

We’d recommend you speak to a Course Advisor in your local centre to find out whether they are registered to offer any such schemes and discuss your requirements further.

* Terms and Conditions apply. Speak to a Course Advisor for full information on the options available to you.

Career Path

This course will be helpful to anyone looking to develop a foundational understanding of key information security concepts.

What's the Difference?

We offer a range of training packages in a range of subject areas and can offer blended learning opportunities to best meet your needs.

Our courses are practical in nature and focus on a single subject and can last anywhere from a few hours to a few days.

Diplomas are designed to give you a complete skillset mapped to a specific career path and contain a number of core and elective courses.