Certified Cyber Security Professional (CCS-PRO)

by Pearce Mayfield Claim Listing

In this Certified Cyber Security Professional (CCS-PRO) training course, delegates will learn how they can avoid and protect themselves or organisation from cybersecurity threats. During this course, they will learn the importance and practices of cybersecurity.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Pearce Mayfield Logo

img Duration

1 Day

Course Details

A cyberattack is an unauthorised effort by an individual or organisation to crack the information system of another individual or organisation. Cyber-attacks hit businesses every day, and there are two types of companies “those that have been hacked, and who do not yet know they have been hacked,” so acquiring knowledge how attacks work and more significantly how to defend yourself against those attacks can be very fulfilling.

In this Certified Cyber Security Professional (CCS-PRO) training course, delegates will learn how they can avoid and protect themselves or organisation from cybersecurity threats. During this course, they will learn the importance and practices of cybersecurity that can be applied in the business environment.

This course also provides delegates with the latest up-to-date knowledge of the cybersecurity threats that the world is facing today. The day-to-day best practices to reduce risk also ensure that delegates can pass the CCS-PRO exam. By attending this masterclass, professionals can enrich their value within the company and can use their knowledge to advance cybersecurity in their enterprise.

 

What Delegates Will Learn:

  • How Phishing attack works
  • DDOS Attack
  • Encryption Techniques
  • Web Security
  • Actions for Combating Cyber Threats
  • Physical Security

 

Course Outline:

  • Cyber Threats Affecting Businesses
  • The Impact of Cyber Threats
  • Hacking
  • Identity Theft
  • Website Security
  • Email
  • Credibility
  • Phishing
  • Web Security
  • DDOS
  • Social Media
  • Mobile Devices
  • Bring Your Own Device (BYOD)
  • Spyware, Malware, and Ransomware
  • Malware Symptoms
  • Physical Security
  • Actions for Combating Cyber Threats
  • Passwords
  • Encryption Techniques
  • Secure Mobile Devices
  • Removable Media
  • 2-Factor Authentication
  • Browsing
  • Sensitive Data
  • General Actions for Combating Cyber Threats
  • Dealing with Risk
  • The Threat Landscape
  • Identifying Risk
  • Assessing Risk
  • Mitigating Risk
  • Risk Register
  • Reading Branch

    Reflex, Cain Road, Reading

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy