Cyber Security Awareness Training

by Samurai Security Claim Listing

The training can be linked directly to the success of the phishing campaign. We would provide some examples and discuss the tactics used by malicious actors along with the mitigation strategies that could be employed.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Samurai Security Logo

img Duration

Please Enquire

Course Details

Whilst securing a network and installing a firewall or malware protection can secure the perimeter of the network, staff awareness is critical to the successful implementation of information security.

We offer training across the full spectrum of information security awareness, implementation and management. Our training sessions can be delivered in line with the bespoke requirements of our clients to ensure that your staff receives high quality, focussed instruction, delivered by Information Security Professionals with an established reputation for quality.

Our Security Awareness courses include topics such as email security, phishing, ransomware, attachments, malicious hyperlinks and the correct use of IT equipment (USB policies, personal devices and using a guest network).

The training we provide are highly interactive and focus on the specific risks and threats to your organisation. We include live interactive quizzes, real life examples and focused breakout sessions.

The training can be linked directly to the success of the phishing campaign. We would provide some examples and discuss the tactics used by malicious actors along with the mitigation strategies that could be employed. These sessions would include two round table breakout sessions were the theories would be explored by the attendees and opened to discussion.

We work through risk assessments and cognitive biases. We explain why, as a species, we make poor decisions, we provide examples and get the attendees to interactively estimate the risks. We then see what the actual calculated risks are and explain the differences. The purpose is to demonstrate that through our own cognitive biases what we perceive as low risk and low impact can often be entirely different.

Following on from this we go through technical risks, we build a list of technical risks specific to the organisation and provide real life examples of how these risks can affect individuals and the organisation and what can be done to help prevent or reduce them.

Finally, we will discuss actual phishing and social engineering compromises, both ones used in actual breaches and those we have performed successfully in red team tests. We bring together how the cognitive biases and technical strategies previously discussed are exploited to compromise one of the easiest hacking targets of all, us.

  • Sheffield Branch

    Unit 3, Hazel Court, Midland Way Barlborough, Sheffield

Check out more Cybersecurity courses in UK

London IT Training (LIT) Logo

Certificate In Information Security Management Principles Training

CISMP (Certificate in Information Security Management Principles) is a widely accepted and globally recognized entry-level qualification which validates the adequate skill on Information Security Management of an IT professional. CISMP course is accredited by the Chartered Institute of IT.

by London IT Training (LIT)
ECDIS Logo

Cyber Security Awareness (CSA)

This course is intended to provide a broad understanding of what cyber security is and the importance of the very real threat this can be to every day computer systems. In addition, trainees will also understand how to avoid these threats and learn from previous real-life examples.

by ECDIS [Claim Listing ]
London IT Training (LIT) Logo

Certified Information Security Management – CISM Training

This certification course is designed for IT professionals and executives who are responsible for managing, designing, developing, deploying and configuring the enterprise-level security protocols for the organization.

by London IT Training (LIT)
Impact IT Training Logo

Certificate In Information Security Management Principles (CISMP)

BCS Certificate in Information Security Management and Principles (CISMP) covers concepts, approaches and techniques, which are applicable to BCS  Foundation CISMP. 

by Impact IT Training [Claim Listing ]
Talented Training Logo

Security

This regulated qualification is ideal for anyone wishing to work as a security officer. It is based on relevant SIA specifications for learning and qualifications, and therefore provides the necessary skills and knowledge for learners to apply for an SIA licence in this field.

by Talented Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy