Cyber Security for Managers

Uncategorized
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

By the end of this course, participants will be able to:

  • State the basic requirements for securing Operating Systems
  • Demonstrate basic knowledge of network and data transmission standards
  • Demonstrate basic knowledge of the legal dimensions related to cyber security
  • Describe the causes of cyber security risk and attack vectors

Course Content

  • Introduction to Cyber Security
  • What is Cyber Security
  • The advent of the Digital Age
  • The ubiquitous nature of network connectivity
    The internet of things

Operating Systems

  • Types of Operating Systems
  • Managing users, groups, resources and hardware
  • Principles of Hardening Operating Systems
  • Supervisory Control and Data Acquisition (SCADA) systems

Networking Fundamentals

  • Basic concepts in Communications and Networking
  • Transmission Medium (Network Cables and wireless)
  • Network Hardware
  • Wide Area Networks (WAN) and Local Area Networks (LAN)
  • Network Protocols
  • Ethernet topologies and technologies; Networking components
  • An introduction to Virtual LANs; Internet Protocol (IP) routing concepts
  • 802.11 industry networking standards

Cyber Security Regulations, Compliance and Auditing

  • Laws and regulations
  • Data regulations – GDPR
  • Understanding professional ethics
  • Understanding compliance requirements and procedures
  • Access reviews and audits-and internal audit of capability
  • Education, training and awareness requirements

Cyber Security Threats and Risks

  • Bring Your Own Device (BYOD)
  • Cloud, The ‘Internet of Things’ and intelligent networked devices
  • Bot Net/Distributed Denial of Service
  • Social Networks, Mobile Apps
  • Click Jacking/Cross Site Scripting
  • Phishing, Online Fraud
  • Convergence Gaps-Physical Theft
  • Hacking, Insider and Data Exfiltration
  • Social Engineering/Espionage
  • Organisational Awareness, ID Theft
  • Virus/Targeted Malicious, Advanced Persistent Threats

Pre-requisite for Course Registration

Participants should have basic knowledge of office computer use.

Show More

Student Ratings & Reviews

No Review Yet
No Review Yet