Cyber Security Training Course
Businesses today face a range of cyber security threats, so it’s important to be aware of how and where vulnerabilities can occur. This session looks at what physical and digital security measures you can put in place, and how to keep your working practices safe and sustainable.
Information security is critical in the current environment. No matter how many technological measures are implemented, the information in your organisation is not completely secure unless your employees are trained in security awareness policies and procedures. The aim of this course is to reduce the likelihood of human error by familiarising non-technical staff with security awareness policies and procedures. It ensures that your information assets are better protected, and increases customer and employee confidence in your organisation.
Information security is critical.
Who is this course for?
Our cyber security courses are ideal for office managers and administrators, IT staff and SME owner-managers.
They are aimed at all employees who are involved in processing information, use information technology in their daily job, or use the Internet as a means of conducting business. More generally, it’s a useful awareness raising session for all regular users of information technology. The course content is not technical, and it is not meant for system administrators.
Training aimed at all employees.
Cyber Security Course Content
- What are the risks?
- How secure are we?
- What can you do?
- Awareness and behaviour
- Software updates
- Firewalls
- Anti-virus / malware protection
- Websites & secure hosting
- Permission setting and logins
- Phishing
- Email scanning
- Sandboxing
- Digital signatures
- Encryption
- Remote access
- Phones and tablets
- Special precautions
- Premises
- Server rooms and workstations
- Securing hardware on-site
- Securing devices off-site
- Roles and responsibilities
- Password setting
- Use of portable devices/memory
- Security awareness training
- Staff inductions
- Disaster recovery planning
- Cloud technologies
- Back-up
- Security audits
- Roles and responsibilities
- Awareness checks
- Penetration testing
- Third party monitoring
For more information contact us...
If you need responsive and reliable IT solutions that are tailored to your business, then contact the experts at AMP. Our skilled engineers provide outstanding IT support and technical expertise you can depend on.