Managing Cyber Security Risk Training Course

by Synergie Training Claim Listing

Modern organisations face the constant threat of cyber attack. Creating an effective cyber risk strategy to mitigate the risk of cyber crime is the only way to ensure your survival, but cyber security management can be complex and costly.

£1695

Contact the Institutes

Fill this form

Advertisement

Synergie Training Logo

img Duration

3 Days

Course Details

Modern organisations face the constant threat of cyber attack. Creating an effective cyber risk strategy to mitigate the risk of cyber crime is the only way to ensure your survival, but cyber security management can be complex and costly.

With so many standards, best practices and technical controls to choose from, how do you get started on your plan?

The three-day Managing Cyber Security Risk classroom training course builds on basic foundation-level knowledge of information security management practices to equip practitioners with the expertise to manage cyber security risk and meet compliance objectives in organisations of any size. 

It also supports professional development: delegates who pass the included exam are awarded the ISO 17024-certificated Managing Cyber Security Risk (CCRMP) qualification by IBITGQ.

Drawing on real-life case studies, an experienced senior information risk consultant will provide you with insights to enable you to create a blueprint for a plan that not only includes the implementation of technical measures (controls) but also takes into account the people, processes, governance, leadership and culture in your organisation.

 

What Will You Learn On This Course?

  • The nature of cyber risk and types of cyber attack.
  • The difference between cyber security and cyber resilience.
  • Practical lessons with examples of real cyber breaches.
  • An understanding of current cyber security standards and best practices:
  • PAS 555
  • 10 Steps to Cyber Security
  • 20 Critical Controls for Cyber Defence
  • Cyber Essentials scheme
  • ISO 27001 and integrated management systems
  • Links to other standards, including ISO 20000
  • Other frameworks, such as NIST, COBIT 5, the PCI DSS and RESILIA
  • The role and the importance of people, processes and technology.
  • Approaches to risk management, cyber incident response and business continuity.
  • How ISO 27001 provides a backbone for protecting your organisation.
  • Why ISO 22301 is essential to achieving cyber resilience in the event of an attack.
  • Glasgow Branch

    272 Bath Street, Glasgow

Check out more Cybersecurity courses in UK

Grey Wolf Cyber Security Logo

Certified Information Systems Security Professional

The Certified Information Systems Security Professional draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards and practices.

by Grey Wolf Cyber Security [Claim Listing ]
UWE Bristol Logo

Cyber Security

This 16 week programme will train you in the identification and mitigation of security threats and help you to develop the basic technical knowledge and software development skills necessary to ensure that organisations can keep their business and customers safe

by UWE Bristol [Claim Listing ]
Right Turn Security Logo

Penetration Testing Training

This Training course can help the employees to detect and understand the vulnerabilities of their wireless system and measures to secure it. Penetration testing prevents organisations from attackers, which can compromise their wireless network and steal their valuable data

by Right Turn Security [Claim Listing ]
JBI Training Logo

CISM Training Course

Experienced IT and Information Security staff who need to understand the concepts and threats and the impact on their organisations and also need help to prepare for CISM certification

by JBI Training [Claim Listing ]
Seiber Logo

Certified Information Security Manager

The ISACA Certified Information Security Manager (CISM) qualification promotes internationally recognised security practices and supports the individual who manages, designs, oversees and assesses an enterprise’s information security.

by Seiber [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy