Course Image Common Cyber Security Threats and Mitigation Strategies

Common Cyber Security Threats and Mitigation Strategies

Learn about cyber security threats including trojans, viruses, and worms, as well as Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks, and mitigation strategies.
Course Image Formulating Cyber Security Strategy

Formulating Cyber Security Strategy

Gain the skills to define and develop a strategic framework for cyber security, that addresses the relationships between data, networks, machines, users, and applications, while also learning the imp…
Course Image Implement Cyber Hygiene Principles

Implement Cyber Hygiene Principles

Learn how to identify and prioritise key organisation services, and how to implement the eleven essential cyber hygiene best practices. You will also gain an understanding of the role of cyber hygien…
Course Image Managing Cyber Risk

Managing Cyber Risk

Learn about risk management, how to anticipate risk, and how to perform risk assessments. Find out how to respond to risk using best practice risk frameworks.
Course Image Penetration Testing and Ethical Hacking

Penetration Testing and Ethical Hacking

Learn how to discover vulnerable applications, common threats, and mitigation strategies. Find out more about ethical hacking, as well as best practice policies and procedures.
Course Image Promote Cyber Security Awareness

Promote Cyber Security Awareness

Learn the various models for determining awareness policy, strategy, and implementation, and why presenting examples of failures to comply is important. Additionally, learn more about awareness strat…
Course Image Protecting Your Business

Protecting Your Business

Learn how to identify and prioritise key organisation services, and how to implement the eleven essential cyber hygiene best practices. You will also gain an understanding of the role of cyber hygien…
Course Image Response and Recovery from Cyber Attacks

Response and Recovery from Cyber Attacks

Learn what do you do when you’re experiencing a cyber attack, best practice incident management skills, and how to manage disclosure when recovering from a cyber attack.