Operations Training

Course Category

The new General Data Protection Regulation (GDPR) is coming into force in May 2018. Brexit will not change the implementation of these regulations. Do you understand your obligations and are you ready to meet them? Even if your company does not currently have to comply with the Data Protection Act, this could change under the new regulation The National Cyber […]

, Course Details »

The Cyber Security & Privacy Essentials (CSPE) course will both broaden and deepen your understanding of Cyber Security. With attacks becoming more common and the complexity ever increasing, security awareness at all levels within an organisation is key. Cyber security has moved beyond being just an IT issue and now involves everyone. The CSPE course has also been given GCHQ […]

, , Course Details »

Can your business swiftly discover and then recover from a cyber attack? Most companies are unable to discover cyber criminals for an average of 200 days!  Organisations may have business continuity plans in place but many fall short after they discover they have been attacked by cyber criminals and their confidential and sensitive data has been breached. Cyber Management Alliance’s […]

, , Course Details »

This session is a brief introduction to all the topics in the series and will bring a delegate to a level where they can understand the meaning of each of the subjects and what would be most appropriate to their business. For some this may be all they need, others may choose to take a deeper dive with one of […]

, , , , Course Details »

This class is suitable for delegates who wish to understand what technologies and processes are necessary for a solid basic level of technical security in line with UK government recommendations. A delegate will learn about the five key technical controls that the UK government recommends a business should have in place through its Cyber Essentials scheme. Some of these controls […]

, , , , Course Details »

This class is suitable and recommended for all people in an organisation, it encourages awareness in both private and business life Cyber Security is not just an IT issue it is part of everyone’s job! A delegate will learn about the human element of Cyber Security and understand how the majority of attacks occur because of human error or through […]

, , , , Course Details »

Learning Objective: To enable attendees to understand key concepts of the data protection act and how to apply them to their own organisation. To provide background and understanding of the principles of data protection To provide practical advice on how to deal with determining purpose, Subject Access requests, data retention and data auditing. To assist attendees to understand the impact […]

, , , , Course Details »

A delegate will learn what social marketing is, how to make a plan and execute it, and how to be safe while doing it. At the end of the session a delegate will understand: How to use social media to communicate with and grow your market. Matching a social channel to your business Be aware of the commitment needed for […]

, , , , Course Details »

This class is suitable for owners, directors and managers who need to understand their responsibilities around Data Protection compliance Although the word “governance” sounds very grand the things you need to do are relatively simple. This course takes Data Protection Compliance as its foundation and helps a delegate understand and plan to put in place the things a small company […]

, , , , Course Details »

  This class is suitable for people who have a responsibility for business continuity and includes directors and managers from both business and IT. Sometimes no matter what you do the worst happens. This class discusses the value of Cyber Insurance and how to develop a plan to respond if a breach is discovered. A delegate will learn: That all […]

, , , , Course Details »

Course Description “Learn to conduct a Penetration Test to CHECK standards.”  Penetration testing is carried out by a range of organisations to assess their security posture from attack from both an external and internal standpoint.  For a penetration test to add value, the testers carrying out such testing need to be technically competent and follow an accepted methodology.  This course […]

, Course Details »

  This class is for companies designing or procuring new systems and deploying interfaces and integrations A delegate will learn: What is safe by design How to design safety into a change process Testing and verification procedures This class is quite technical in nature and delegates should have an understanding of databases, infrastructure and software strategies. The class teaches how […]

, , , , Course Details »

This class is fairly technical in nature and it would be helpful if delegates have a basic understanding of system architectures and how they connect to the internet. However, this is not essential as concepts will be explained. The class begins by describing a penetration test,  the process an ethical hacker will use to test the security of a system. […]

, , , , Course Details »

Safe Social Media training will help organisations: Interested in exploring social media as a means of growing their market and developing stronger relationships with their customer base understand the first steps and assess how valuable Social Tools are to their businesses Already using social media to understand how their approach might be modified to better achieve their objectives Use social […]

Course Details »

This course helps you design your Social Media Strategy, what platforms work for you, how to turn likes into leads and most importantly, how to stay safe online. This covers privacy and Cyber Security Concerns. Booking is via http://apps.business-central.co.uk/apps/ViewEvent.aspx?Event=1287    

Course Details »

Find out how content marketing can save you time and effort, whilst increasing engagement with your customers. Discover how to create compelling and engaging content to boost your leads online. Booking via http://apps.business-central.co.uk/apps/ViewEvent.aspx?Event=1288

Course Details »

LIVE Public Event – 5 day course (price includes the PECB Lead Auditor exam – taken on Day 5) Mastering the audit of an Information Security Management System (ISMS) based on ISO/IEC 27001 The ISO/IEC 27001 Lead Auditor (27001LA) five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage […]

, , Course Details »

The National Cyber Awareness Course will help individuals and teams: Understand the human dimension of Cyber Risk Recognise and respond to a Cyber attack Be aware of risks introduced as internal and external systems and tools are introduced, used and integrated across an organisation and delivered on devices such as tablets, phones and laptops Promote Cyber Safety in both their […]

Course Details »

What is Digital Abuse? The use of technologies such as texts and social networks to bully, harass, stalk or intimidate a partner or other person. This abuse is typically emotional and/or verbal and can have a strong impact on a victim’s real life What form does Digital Abuse take? Examples include: Telling a person who they can or can’t be […]

Course Details »