Booking options
£967
£967
Delivered Online or In-Person
You travel to organiser or they travel to you
Redhill
Full day
All levels
The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken.
Non-technical staff working with computers.
None.
1 day
Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response.
Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering.
Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity.
ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.