Our Cyber Security Awareness training programme has been developed to provide employers and employees with a general understanding of the threats to cyber/information security that they face, help them to recognise the threats and vulnerabilities to their company’s information assets, and respond to them appropriately including detailing the countermeasures that can be adopted.
The programme has been developed on a modular basis using elements from our highly regarded hands-on technical training courses in addition to materials produced solely for the programme. Each module varies in length between 30 minutes to 90 minutes – but each can be tailored or combined to provide organisations with a programme that best suits their requirements.
- Reduce the risk of a cyber security breach
- Instil proper behaviour in to the people who come in to contact with your valuable assets
- Protect your brand and reputation and avoid the resulting media attention
The Threat – This module provides an overview of cyber threat landscape faced by organisations, outlining the impacts of cyber security incidents as well as tactics and strategies to aid cyber defence.
Passwords and password management – Passwords are the keys to your sensitive data when using websites, email accounts and your computer itself (via User Accounts). This module is designed to provide users with an understanding of the importance of strong passwords along with some simple techniques to assist users in choosing and managing their passwords.
An introduction to hacking – This module introduces the basic technical concepts behind the various stages of a hacking attack, as well as some common tools and techniques used by hackers and security professionals alike.
Phishing attacks – This module takes a detailed look at what phishing is, why it poses a threat and how users can minimise their exposure to phishing attacks.
People risk / insider threat – This module looks at the weakest security link in any organisation – its people. Most organisations have good technology, but people often bypass controls or forget procedures. Guidance will be provided on how to help people do the right thing, and deterring or detecting malicious intent.
Social Engineering – This module looks at what social engineering is, who or what are social engineers, what they want, how they get it, and how to stop them
Bring Your Own Device (BYOD) -This module introduces users to the growing trend of BYOD, analysing the Pros and Cons as well as providing guidance on BYOD policy considerations.
Safe internet use – While the internet offers us many benefits, this module is designed to highlight that there are a number of risks associated with going online – some general and some specific to the respective activities that you’re undertaking – including threats to the integrity of our identity, privacy and the security of our financial transactions.
Online and mobile banking – Online banking is becoming ever more popular and most importantly it’s convenient and reasonably safe – as long as you take reasonable precautions as detailed in this module.
Online shopping – This module identifies the steps that should be taken to make sure that you are shopping safely
Social networking – Social media has revolutionised the way we communicate with others. We can now talk one-to-one or to large groups of people at once from the convenience of our computer or mobile device. This module identifies the ways in which ID fraudsters harvest sensitive information from these services and provides best practices to mitigate them.
Using wireless networks – This module provides an overview of the unsecure nature of wireless networks and how that risk can be mitigated.
Antivirus software and installing updates – This module explains why it is necessary to install antivirus software and patches.
PCI DSS – This module provides an introduction to PCI DSS, what it is and why it’s important
Home and Mobile Working – This module explores the potential threats of working remotely and provides guidance and best practices.
Malware – This module explores, what is and are the types of malware and what should you do if you’re infected.
Physical security – This module highlights the importance of physical security as part of an overall information security strategy and the risks of not considering it – be it as simple as locking your doors and desk/file cabinet drawers, and a clear desk policy.
Removable Media – This module explores the benefits of limiting the use of removable media and producing policy to support this.
Are you ready to investigate training programmes for your organisation?
For further information on how you can improve the security posture of your organisation through tailored cyber skills training programs, or for any of our cyber security training courses, get in touch with our dedicated Education team today or call +44 (0) 1763 285 285.
WHAT OUR CUSTOMERS SAY
”After completing the CSTP Ethical Web Application Hacking training course, I applied for a few pen testing positions and I recently joined Marks & Spencer as an Ethical Hacker. The training at PA consolidated my previous knowledge in web application security and therefore helped me a lot in my career.Ethical Hacker, Marks and Spencer