IT Training & Certifications

Course Category

The Cyber Security & Privacy Essentials (CSPE) course will both broaden and deepen your understanding of Cyber Security. With attacks becoming more common and the complexity ever increasing, security awareness at all levels within an organisation is key. Cyber security has moved beyond being just an IT issue and now involves everyone. The CSPE course has also been given GCHQ […]

, , Course Details »

Can your business swiftly discover and then recover from a cyber attack? Most companies are unable to discover cyber criminals for an average of 200 days!  Organisations may have business continuity plans in place but many fall short after they discover they have been attacked by cyber criminals and their confidential and sensitive data has been breached. Cyber Management Alliance’s […]

, , Course Details »

This class is suitable and recommended for all people in an organisation, it encourages awareness in both private and business life Cyber Security is not just an IT issue it is part of everyone’s job! A delegate will learn about the human element of Cyber Security and understand how the majority of attacks occur because of human error or through […]

, , , , Course Details »

This session is a brief introduction to all the topics in the series and will bring a delegate to a level where they can understand the meaning of each of the subjects and what would be most appropriate to their business. For some this may be all they need, others may choose to take a deeper dive with one of […]

, , , , Course Details »

This class is suitable for delegates who wish to understand what technologies and processes are necessary for a solid basic level of technical security in line with UK government recommendations. A delegate will learn about the five key technical controls that the UK government recommends a business should have in place through its Cyber Essentials scheme. Some of these controls […]

, , , , Course Details »

Learning Objective: To enable attendees to understand key concepts of the data protection act and how to apply them to their own organisation. To provide background and understanding of the principles of data protection To provide practical advice on how to deal with determining purpose, Subject Access requests, data retention and data auditing. To assist attendees to understand the impact […]

, , , , Course Details »

A delegate will learn what social marketing is, how to make a plan and execute it, and how to be safe while doing it. At the end of the session a delegate will understand: How to use social media to communicate with and grow your market. Matching a social channel to your business Be aware of the commitment needed for […]

, , , , Course Details »

This class is suitable for owners, directors and managers who need to understand their responsibilities around Data Protection compliance Although the word “governance” sounds very grand the things you need to do are relatively simple. This course takes Data Protection Compliance as its foundation and helps a delegate understand and plan to put in place the things a small company […]

, , , , Course Details »

  This class is suitable for people who have a responsibility for business continuity and includes directors and managers from both business and IT. Sometimes no matter what you do the worst happens. This class discusses the value of Cyber Insurance and how to develop a plan to respond if a breach is discovered. A delegate will learn: That all […]

, , , , Course Details »

Course Description “Learn to conduct a Penetration Test to CHECK standards.”  Penetration testing is carried out by a range of organisations to assess their security posture from attack from both an external and internal standpoint.  For a penetration test to add value, the testers carrying out such testing need to be technically competent and follow an accepted methodology.  This course […]

, Course Details »

The Cyber Security & Privacy Essentials (CSPE) course will both broaden and deepen your understanding of Cyber Security. With attacks becoming more common and the complexity ever increasing, security awareness at all levels within an organisation is key. Cyber security has moved beyond being just an IT issue and now involves everyone. The CSPE course has also been given GCHQ […]

, Course Details »

  This class is for companies designing or procuring new systems and deploying interfaces and integrations A delegate will learn: What is safe by design How to design safety into a change process Testing and verification procedures This class is quite technical in nature and delegates should have an understanding of databases, infrastructure and software strategies. The class teaches how […]

, , , , Course Details »

This class is fairly technical in nature and it would be helpful if delegates have a basic understanding of system architectures and how they connect to the internet. However, this is not essential as concepts will be explained. The class begins by describing a penetration test,  the process an ethical hacker will use to test the security of a system. […]

, , , , Course Details »

Overview 2 day course to train people to assess against the Cyber Essentials and IASME standard, and GDPR Readiness Format The course consists of a classroom session followed by a number of monitored assessments.  When you achieve confidence and competence in the processes and your company achieves certification against the standard, then you will be certified to carry out assessments on […]

, Course Details »

LIVE Public Event – 5 day course (price includes the PECB Lead Auditor exam – taken on Day 5) Mastering the audit of an Information Security Management System (ISMS) based on ISO/IEC 27001 The ISO/IEC 27001 Lead Auditor (27001LA) five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage […]

, , Course Details »

Duration: 5 days / 40 hours The Certificate in Information Security Management Principles course is designed to provide the foundation of knowledge necessary for individuals who have information security responsibilities as part of their day to day role, or who are thinking of moving into an information security or related function. It also provides the opportunity for those already within these roles […]

Course Details »

Duration: 5 days / 40 hours (BCS Exam included but taken at a later date). The Practitioner Certificate in Information Risk Management (PCilRM) course is designed to provide foundation knowledge of the terminology and principles of information risk management. It is intended for individuals from information technologies or IT security backgrounds who are embarking on information risk management responsibilities or […]

Course Details »

The Foundation Certificate in Information Security (FCIS) is designed to provide the foundation of knowledge necessary for individuals who have information security responsibilities as part of their day-to-day role, or who are thinking of moving into an information security function. The FCIS course introduces the concepts of and disciplines within Information Security and how these can contribute to and form […]

Course Details »

Duration: 5 days / 40 hours The Practitioner Certificate in Business Continuity Management (PCiBCM) course is designed to provide a hands-on approach to all stages of the business continuity management (BCM) lifecycle from conducting a business impact analysis to the exercising of business continuity plans. Making full use of current standards (including BS 25999), students are able to make a […]

Course Details »

Duration: 5 days / 40 hours The Practitioners Certificate in Information Assurance Architecture course prepares the student for a career in security architecture. A Security Architect (SA) is a senior-level enterprise architect role, either within a dedicated security team or as part of a more general Enterprise Architecture (EA) team. It also provides the opportunity for those already within these roles to […]

Course Details »

Duration: 2 days / 16 hours It is rare for todays’ IT systems to have no security facilities within them. Many organisations, or projects, cannot afford to have an assigned security architect. Yet many solutions or technical architects do not have a good understanding of Information Assurance (IA). This means that many systems are being designed and built that do […]

Course Details »