Thumb

Management with adaptable practices

We denounce with righteous indige nation and dislike men who are so beguiled and demo realized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee the pain and trouble that are bound to ensue cannot foresee. These cases are perfectly simple and easy to distinguish. In a free hour, when our power of choice is untrammelled data structures manages data in technology.

Cyber Security Risk Management Course Outline

The course covers the following topics:

Introduction to Cyber Risk

  • What is cyber security risk?
  • Types of risk
  • The threat landscape
  • The impact of cyber threats

Dealing with Risk

  • Identifying risk
  • Evaluating risk
  • Mitigating threats

Risk Management

  • Risk management as part of a wider cyber security management approach
  • Meeting cyber security standards
  • Risk management strategy
  • Following best practice

By the end of the course, you will:

  • Understand how today’s cyber-attacks are executed
  • Recognise the key categories of cyber-attack
  • Discover key strategies that can prevent or mitigate cyber-security risks
  • Gain skills in the detection and investigation of cybercrime
  • Assess & assure the cyber-security posture of your organisation

Who should attend this Cyber Security Training Course?

The course is designed for cyber security practitioners who are involved in planning and executing risk management strategy. It is also suitable for general risk managers who would like improve their knowledge of cyber risk.

Prerequisites

There are no prerequisites to attend.

Cyber Security Risk Management Course Overvie

This 1-day course provides a comprehensive introduction to the assessment and management of cyber security. Equipping cyber security practitioners and managers with an understanding of what should be in a risk management strategy, the course provides foundation-level knowledge of information security management best practice to help organisations defend themselves from threats.

What’s Included in this Cyber Security Training Course?

In this Cyber Security Risk Management course, delegates will be provided with:

  • The Knowledge Academy’s Cyber Security Risk Management Delegate Pack
  • Experienced Instructor
  • Completion Certificate
  • Refreshments

BCS CISMP (Certificate in Information Security Management Principles) Exam Information

This BCS CISMP (Certificate in Information Security Management Principles) exam is formatted in the following way:

  • Type: Multiple Choice
  • Duration: 2 Hours
  • Supervised: Yes
  • Open Book: No
  • Total questions: 100
  • Pass Mark: 65/100 (65%)
4