Is This for You?

This is an intermediate-level security course for working or aspiring IT professionals seeking to deepen their understanding of best practice in data, cloud, and information security.

Award and Associated Qualifications

Awarded 30 CPD points upon successful completion

Start Date
Flexible
Study Type
In centre, online, or a combination
Training Type
course
Duration
30 hours

About This Course

To mitigate cyber, data, cloud, and information security risks, you need solid knowledge of the complete network security process, from network design to deployment to continuous monitoring. In this course, you’ll explore a variety of network security concepts and techniques for mitigating security risks.

Effective cybersecurity risk management requires intricate knowledge of day-to-day IT security risks, network vulnerabilities, and cyber attacks. You’ll learn about cybersecurity breaches and how best to prevent them. You’ll explore commonly used techniques to assess data security and you’ll learn how to protect your organisation’s data.

You’ll also learn how to manage risks from both external and internal sources. You’ll explore the policies, procedures, standards, and guidelines that underpin effective information security for an organisation.

You’ll learn best practices for security breach incident management. And you’ll explore business continuity planning to ensure that your organisation functions smoothly during an unplanned incident or disaster.

COURSE CONTENT

Module 1 – Managing Network & Infrastructure Security Risks

Module 2 – Managing Physical Security Risks

Module 3 – Cyber Security Risks

Module 4 – Managing Security in a Hybrid Workplace

Module 5 – Managing Social Engineering Risks

Module 6 – Information, Cloud & Data Security Risk Considerations

Module 7 – Managing Information, Cloud & Data Security Risks

Module 8 – Handling Natural Threats

Module 9 – Managing Risks from Internal Stakeholders

Module 10 – Maintaining a Secure Workplace

Module 11 – Information Security Governance

Module 12 – Managing the Incidents

Module 13 – Maintaining Business Continuity

Download Course Packet

"*" indicates required fields

Accept*
Hidden
Hidden
Hidden

Aims and Objectives

This course is designed to deepen your understanding of IT security risks and how to prepare for and respond to them.

Pre-Requisites

Security+ course completion or certification or equivalent background and experience.

Finance Options

Wherever possible our training is tailored to your needs. The cost of our training programmes depend on the course(s) you choose and varies according to duration and breadth. Rest assured we have a number of payment options available to ensure the cost of training is affordable and can be worked alongside your other financial commitments. Common ways people fund their training include: –

Self-Funded:

  • Flexible payment plans to help you spread the cost* available at many of our centres;
  • You could opt to pay upfront.

Company Funded:

Requesting funding from your employers needn’t be a daunting task. Many employers support and encourage their employees with their professional development and consider it a worthwhile investment to fund any training required.

What we can help with:

  • Providing a comprehensive training programme outlining learning outcomes
  • Tailored personnel letters
  • Communication with finance departments to arrange payment options (upfront or payment plan*).

Funding & Grants:

There may be the opportunity to apply for funded grants that can help towards the cost of training. These include the Skills Development Scotland ITAs and the ReAct programme in Wales. All schemes will have different terms and conditions that will need to be met in order to qualify for a grant and these are managed by each individual centre.

We’d recommend you speak to a Course Advisor in your local centre to find out whether they are registered to offer any such schemes and discuss your requirements further.

* Terms and Conditions apply. Speak to a Course Advisor for full information on the options available to you.

Career Path

This course will be helpful to anyone who has or seeks responsibility for an organisation’s data, cloud, and information security.

What's the Difference?

We offer a range of training packages in a range of subject areas and can offer blended learning opportunities to best meet your needs.

Our courses are practical in nature and focus on a single subject and can last anywhere from a few hours to a few days.

Diplomas are designed to give you a complete skillset mapped to a specific career path and contain a number of core and elective courses.