Learning will encourage growth of an organisation’s security-minded culture—protecting business assets such corporate intellectual property, improving data protection—and invoke good online behaviours to reduce corporate risk.
Various training formats are available for all levels of staff within an organisation or training can be department-focused. We will work with you to determine the appropriate message and learning outcomes tailored to your audience – and within a suitable duration that fits around participant availability.
This training can be delivered virtually, at our Bristol facility or at our clients’ premises; training is typically for group bookings only.
None as standard. PGI Cyber Academy has experience in developing customised training content followed by completing various, rigorous accreditation processes. Please enquire if having your own bespoke certified cyber security training course might be suitable for your requirements.
By the end of this training, you will develop a well-informed and positive mindset towards cyber security by becoming security aware. You will also be able to discuss business and personal cyber security risks aligning to an organisation’s strategy.
Staff at all levels—both technical and non-technical—who interact with computer systems on a daily basis. Training could be customised and prioritised for specific priority audiences such as Finance or HR departments, or specific job roles such as personal/executive assistants – depending on organisation’s risk profile or any required audience.
Example Learning Outcomes
- Become aware of the cyber threat landscape.
- Understand what threat actors are and what their objectives might be.
- Learn how hackers exploit open source information to gather intelligence.
- Discuss case studies of data breaches and how it may be relevant to your organisation.
- Explain what measures you can take to directly improve your personal and organisational security, and how they align with the three pillars of information security.
- Demonstrate what 2FA and secure passphrases are and the benefits of using them.
- Familiarity with recent hacks and data breaches in the national and international media, as these may be used as case studies or help form discussions on the course.
- Knowledge of business practices within your organisation and any IT user security policies.
- For virtual/remote training a good internet connection/sufficient bandwidth is required, with full audio and video capability.
This training can be tailored to an industry, or for a defined audience with various durations – typically in half-day or 1-day sessions. Example topics can include:
- Definitions – Cybersecurity and Information Security
What are you trying to protect?
- Personal Data and Data Protection
Who are we protecting it from?
- Actors and Motivation – Attack Profiling
Why do they attack?
- Proportionality of Attack
- Cyber Threat Methodology
- Open Source Intelligence (OSINT)
- Social Engineering
- Common Attack Techniques
- APTs / Cyber Criminals
- State Threats
- Social Media
- Phone Tracking, Geotags and Location Data
- Data Leakage (Wi-Fi and GPS)
- The Deep Web
- Supply Chain Threats
How can we protect ourselves?
- Passwords and Passphrases
- Patching and Updating
- Maintaining Awareness
- Privileged Account Management
- Managing your Digital Footprint
How can we be prepared?
- Business Continuity, Disaster Recovery and Incident Response
- Risk Management
- Cyber Leadership