Back to all courses

Course Type:

In-person

Duration:

3 Days

Prerequisites:

Beginner course

Intermediate Course

Cyber Security by Design

This three-day course will strengthen the understanding of ‘Cyber Security by Design’ and is built around the importance of managing of cyber security risks and will delve into the criticality of “keeping the lights on” thus maintaining business continuity; through appropriately identifying, assessing, and treating the cyber risks to the organisation. This course discusses the significance of compliance of any organisation with legal and regulatory responsibilities and requirements and the need for security audit management for internal assessments and external attestations.

What will you learn?

  • Cyber Security Objectives and Strategy
  • Cyber Security Design
  • Cyber Legislations and Regulations
  • Information Security Management
  • Security Audit and Compliance
  • Human Factors
  • Technical Security Controls
  • Third Party Management
  • Cyber Risk Management

Who is this course for?

  • Information Security Analyst
  • Governance, Risk and Compliance Associate
  • Technology Risk and Controls Analyst
  • Cyber Security Analyst
  • Information Assurance Analyst
  • Risk and Compliance Officer
  • Systems Administrator
  • Cyber/Information Security Consultant

Book your place

10th Apr 24

Cardiff, 09:00 - 17:00

£1,500

18th Jun 24

Cardiff, 09:00 - 17:00

£1,500

Need a bespoke course for your business? We can help:

Enquire about bespoke courses

    Sign up to our newsletter

    Stay up-to-date on the latest cybersecurity trends and technologies by joining the Cyber Innovation Hub newsletter today.

    You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website: privacy policy We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.