Filter Courses
Course Category

Step by Step Cyber Essentials is: A one day classroom based session that teaches organisation the minimum recommended level of Cyber Security and how to achieve it Prepares organisations wishing to earn the accreditation for the assessment process Cyber Essentials: Is the only government-backed, industry supported scheme to encourage awareness and of, and protection from, the escalating risk of Cyber […]

Course Details »

The new General Data Protection Regulation (GDPR) is coming into force in May 2018. Brexit will not change the implementation of these regulations. Do you understand your obligations and are you ready to meet them? Even if your company does not currently have to comply with the Data Protection Act, this could change under the new regulation The National Cyber […]

, Course Details »

The Cyber Security & Privacy Essentials (CSPE) course will both broaden and deepen your understanding of Cyber Security. With attacks becoming more common and the complexity ever increasing, security awareness at all levels within an organisation is key. Cyber security has moved beyond being just an IT issue and now involves everyone. The CSPE course has also been given GCHQ […]

, , Course Details »

Can your business swiftly discover and then recover from a cyber attack? Most companies are unable to discover cyber criminals for an average of 200 days!  Organisations may have business continuity plans in place but many fall short after they discover they have been attacked by cyber criminals and their confidential and sensitive data has been breached. Cyber Management Alliance’s […]

, , Course Details »

“Byte Back” is a short course and is part of our Cyber Bytes programme of courses. It is aimed at front line officers who interface with businesses and individuals and equips them with the knowledge to give basic advice on Cyber Crime prevention Results have been impressive from this short intervention moving self-assessment scores of knowledge of Cyber Crime Prevention […]

Course Details »

This session is a brief introduction to all the topics in the series and will bring a delegate to a level where they can understand the meaning of each of the subjects and what would be most appropriate to their business. For some this may be all they need, others may choose to take a deeper dive with one of […]

, , , , Course Details »

This class is suitable for delegates who wish to understand what technologies and processes are necessary for a solid basic level of technical security in line with UK government recommendations. A delegate will learn about the five key technical controls that the UK government recommends a business should have in place through its Cyber Essentials scheme. Some of these controls […]

, , , , Course Details »

This class is suitable and recommended for all people in an organisation, it encourages awareness in both private and business life Cyber Security is not just an IT issue it is part of everyone’s job! A delegate will learn about the human element of Cyber Security and understand how the majority of attacks occur because of human error or through […]

, , , , Course Details »

Learning Objective: To enable attendees to understand key concepts of the data protection act and how to apply them to their own organisation. To provide background and understanding of the principles of data protection To provide practical advice on how to deal with determining purpose, Subject Access requests, data retention and data auditing. To assist attendees to understand the impact […]

, , , , Course Details »

A delegate will learn what social marketing is, how to make a plan and execute it, and how to be safe while doing it. At the end of the session a delegate will understand: How to use social media to communicate with and grow your market. Matching a social channel to your business Be aware of the commitment needed for […]

, , , , Course Details »

This class is suitable for owners, directors and managers who need to understand their responsibilities around Data Protection compliance Although the word “governance” sounds very grand the things you need to do are relatively simple. This course takes Data Protection Compliance as its foundation and helps a delegate understand and plan to put in place the things a small company […]

, , , , Course Details »

  This class is suitable for people who have a responsibility for business continuity and includes directors and managers from both business and IT. Sometimes no matter what you do the worst happens. This class discusses the value of Cyber Insurance and how to develop a plan to respond if a breach is discovered. A delegate will learn: That all […]

, , , , Course Details »

Information Security Training… an overview An ISO 27001 Information Security Management System is a systematic and process driven approach to protecting your business information. It is designed to quantify and address the risks to the business and provide a structured approach to maintain confidentiality and integrity within your business context.  This standard supports the company in ensuring you meet the needs of your customers, whilst delivering a consistent level of […]

Course Details »

Course Description “Learn to conduct a Penetration Test to CHECK standards.”  Penetration testing is carried out by a range of organisations to assess their security posture from attack from both an external and internal standpoint.  For a penetration test to add value, the testers carrying out such testing need to be technically competent and follow an accepted methodology.  This course […]

, Course Details »

Public Event – 5 day course Malvern, Worcestershire, National Cyber Skills Centre (NCSC) Mastering the implementation and management of an Information Security Management System (ISMS) based on ISO/IEC 27001 The ISO/IEC 27001 Lead Implementer (27001LI) 5-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based […]

Course Details »

  This class is for companies designing or procuring new systems and deploying interfaces and integrations A delegate will learn: What is safe by design How to design safety into a change process Testing and verification procedures This class is quite technical in nature and delegates should have an understanding of databases, infrastructure and software strategies. The class teaches how […]

, , , , Course Details »

This class is fairly technical in nature and it would be helpful if delegates have a basic understanding of system architectures and how they connect to the internet. However, this is not essential as concepts will be explained. The class begins by describing a penetration test,  the process an ethical hacker will use to test the security of a system. […]

, , , , Course Details »

Overview To train people to assess against the IASME standard Format The course consists of a classroom session followed by a number of monitored assessments.  When you achieve confidence and competence in the processes and your company achieves certification against the standard, then you will be certified to carry out assessments on behalf of the IASME Consortium. Prerequisites Some understanding and […]

, Course Details »

Safe Social Media training will help organisations: Interested in exploring social media as a means of growing their market and developing stronger relationships with their customer base understand the first steps and assess how valuable Social Tools are to their businesses Already using social media to understand how their approach might be modified to better achieve their objectives Use social […]

Course Details »

This course helps you design your Social Media Strategy, what platforms work for you, how to turn likes into leads and most importantly, how to stay safe online. This covers privacy and Cyber Security Concerns. Booking is via http://apps.business-central.co.uk/apps/ViewEvent.aspx?Event=1287    

Course Details »

Find out how content marketing can save you time and effort, whilst increasing engagement with your customers. Discover how to create compelling and engaging content to boost your leads online. Booking via http://apps.business-central.co.uk/apps/ViewEvent.aspx?Event=1288

Course Details »

LIVE Public Event – 5 day course (price includes the PECB Lead Auditor exam – taken on Day 5) Mastering the audit of an Information Security Management System (ISMS) based on ISO/IEC 27001 The ISO/IEC 27001 Lead Auditor (27001LA) five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage […]

, , Course Details »

Duration: 5 days / 40 hours The Certificate in Information Security Management Principles course is designed to provide the foundation of knowledge necessary for individuals who have information security responsibilities as part of their day to day role, or who are thinking of moving into an information security or related function. It also provides the opportunity for those already within these roles […]

Course Details »

Duration: 5 days / 40 hours (BCS Exam included but taken at a later date). The Practitioner Certificate in Information Risk Management (PCilRM) course is designed to provide foundation knowledge of the terminology and principles of information risk management. It is intended for individuals from information technologies or IT security backgrounds who are embarking on information risk management responsibilities or […]

Course Details »

The Foundation Certificate in Information Security (FCIS) is designed to provide the foundation of knowledge necessary for individuals who have information security responsibilities as part of their day-to-day role, or who are thinking of moving into an information security function. The FCIS course introduces the concepts of and disciplines within Information Security and how these can contribute to and form […]

Course Details »