Cyber Security Training Course

Businesses today face a range of cyber security threats, so it’s important to be aware of how and where vulnerabilities can occur. This session looks at what physical and digital security measures you can put in place, and how to keep your working practices safe and sustainable.

Information security is critical in the current environment. No matter how many technological measures are implemented, the information in your organisation is not completely secure unless your employees are trained in security awareness policies and procedures. The aim of this course is to reduce the likelihood of human error by familiarising non-technical staff with security awareness policies and procedures. It ensures that your information assets are better protected, and increases customer and employee confidence in your organisation.

Information security is critical.

IT Support - Technician in data centre
IT Training

Who is this course for?

Our cyber security courses are ideal for office managers and administrators, IT staff and SME owner-managers.

They are aimed at all employees who are involved in processing information, use information technology in their daily job, or use the Internet as a means of conducting business. More generally, it’s a useful awareness raising session for all regular users of information technology. The course content is not technical, and it is not meant for system administrators.

Training aimed at all employees.

IT Support Training - Users at desks using computers

Cyber Security Course Content

Introducing Security
  • What are the risks?
How secure are we?
  • What can you do?
  • Awareness and behaviour
Digital Measures
  • Software updates
  • Firewalls
  • Anti-virus / malware protection
  • Websites & secure hosting
  • Permission setting and logins
Email Security
  • Phishing
  • Email scanning
  • Digital signatures
  • Encryption
Mobile Security
  • Remote access
  • Phones and tablets
  • Special precautions


Physical Security
  • Premises
  • Server rooms and workstations
  • Securing hardware on-site
  • Securing devices off-site
Security Policy
  • Roles and responsibilities
  • Password setting
  • Use of portable devices/memory
  • Security awareness training
  • Staff inductions
Secure Back-up
  • Disaster recovery planning
  • Cloud technologies
  • Back-up
Maintaining Security
  • Security audits
Roles and responsibilities
  • Awareness checks
  • Penetration testing
  • Third party monitoring
Contact Us

For more information contact us...

    If you need responsive and reliable IT solutions that are tailored to your business, then contact the experts at AMP. Our skilled engineers provide outstanding IT support and technical expertise you can depend on.

    HP Business Partner