Search our courses
Training

This Cyber Security Overview learning course enables you to understand various terms in cyberspace, such as cyber risks, threats, vulnerabilities, risk management, and so on. It reviews the impact of several cybercrimes committed over the past few years citing relevant real life case studies and examples.
The course emphasizes on the importance of cybersecurity and provides guidance to senior top management as well as employees on the steps to adopt cybersecurity for an organization. Along with understanding the cybersecurity lifecycle, the course identifies industry standard frameworks and best practices that help an organization to achieve a robust and mature cybersecurity posture.

Learning Objectives

  •     Understand cyber risks, threats, vulnerabilities, and risk management.
  •     Understand the impact of cybercrimes with relevant real life case studies/examples.
  •     Understand what is cybersecurity and its relationship with IT Security.
  •     Understand what boards of organizations need to ask and consider for adopting or strengthening cybersecurity in their organizations.
  •     Understand the cybersecurity strategy lifecycle.
  •     Identify industry standard frameworks and best practices that help an organization to achieve a robust and mature cybersecurity posture.
  •     Understand why cybersecurity is not enough today and the necessity of adopting cyber resilience.

Course Agenda:

  • CyberCrimes – Concept, Impact, and Examples
  • Cybersecurity in focus

 

Cyber Security Overview

Course Code

GTSCS

Duration

1 Day

Course Fee

POA

Accreditation

N/A

Target Audience

This Cyber Security Overview learning course is related to the Cybersecurity Foundation course and is developed to help business leaders and IT professionals understand and plan the adoption of NIST CyberSecurity Framework. For example:

  •     CEO, CIO, CISO and other top management executives
  •     Relevant administrators and IT managers
  •     All employees and individuals of an organization, especially those that are working in the cloud or cyberspace environment

 

Attendee Requirements

  • There are no specific requirements for this course. Please contact us to discuss your suitability.

We are sorry, there is currently no availability on this course.

contact us for more information

Ways to Attend this Course

  • In the Classroom
  • Private Training

Expand all

Course Description

This Cyber Security Overview learning course enables you to understand various terms in cyberspace, such as cyber risks, threats, vulnerabilities, risk management, and so on. It reviews the impact of several cybercrimes committed over the past few years citing relevant real life case studies and examples.
The course emphasizes on the importance of cybersecurity and provides guidance to senior top management as well as employees on the steps to adopt cybersecurity for an organization. Along with understanding the cybersecurity lifecycle, the course identifies industry standard frameworks and best practices that help an organization to achieve a robust and mature cybersecurity posture.

Learning Objectives

  •     Understand cyber risks, threats, vulnerabilities, and risk management.
  •     Understand the impact of cybercrimes with relevant real life case studies/examples.
  •     Understand what is cybersecurity and its relationship with IT Security.
  •     Understand what boards of organizations need to ask and consider for adopting or strengthening cybersecurity in their organizations.
  •     Understand the cybersecurity strategy lifecycle.
  •     Identify industry standard frameworks and best practices that help an organization to achieve a robust and mature cybersecurity posture.
  •     Understand why cybersecurity is not enough today and the necessity of adopting cyber resilience.

Course Agenda:

  • CyberCrimes – Concept, Impact, and Examples
  • Cybersecurity in focus

 

Course Outline


CyberCrimes: Concept, Impact and Examples
Basic terminologies
Definition of cybercrimes
What is Crimeware?
Cybercrimes: Main actors and their motives
Why do cybercrimes occur?
When, and where, and how do cybercrimes occur?
Who are targeted by cybercrimes?
How do cybercrimes occur? Anatomy of cyberattacks
Elements involved in a typical cybercrime breach
Consequences of cybercrimes
Real life impacts of cybercrimes with case studies

Cybersecurity in focus
Cybersecurity definition
Benefits of Cybersecurity
CyberSecurity considerations for management
What the Board-of-Directors needs to ask and consider
Cybersecurity lifecycle
Cybersecurity frameworks
NIST Cybersecurity Framework (CSF)
ISO 27001 Cybersecurity Framework
ISO 27032 Cybersecurity Framework
COBIT 5
Cybersecurity best practices and tips for employers and employees
Cybersecurity vs. Cyber Resilience

  •     Also Discussed – Cybercrimes and Cybersecurity: Basic Terminologies

 

 

Learning Path
Ways to Attend
  • Attend a public course, if there is one available. Please check our schedule, or register your interest in joining a course in your area.
  • Private onsite Team training also available, please contact us to discuss. We can customise this course to suit your business requirements.

Sorry, we are not taking bookings on this course at present

If you would like to contact us for more information on this course, you may do so here:

Contact us

Technical ICT learning & mentoring services

Private Team Training

Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.

Learn more about our Private Team Training

What Our Clients Say

“Very interesting course from an excellent instructor. Highly technical and well delivered”

 

Introduction to Modern Security - GTJ50

Dec '17

“Super experience. The instructor spoke with great knowledge and experience. The materials will be invaluable in the real world”

 

Professional Cloud Service Manager Certification training- GTC13

Dec '17

“Very useful course, making complex topics more approachable and the instructor was very good at getting concepts across and engaging with delegates and our specific needs”

 

Optimising Java - GTJ47

Dec '17

“This was an excellent course and I found it very interesting and enjoyable.  The instructor was a font of knowledge on all aspects of Big Data and Analytics and was enthusiastic about sharing his knowledge”

 

Applied Data Science and Big Data Analytics - GTBD7

Nov '17

“The instructor was fantastic at explaining lessons with applicable work type examples.  He was enthusiastic with what he was teaching which made learning the course more enjoyable”

 

Linux Essentials Certification - GTU2

Oct '17

"Intelligence is the ability to avoid doing work, yet
getting the work done"

Linus Torvalds, creator of Linux and GIT

Technical ICT learning & mentoring services

About GuruTeam

GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials

Download our eBrochure
Our Accreditation Partners
Upcoming Courses

Optimising Java

16-17 April

Cork - limited places

Written & presented by Ben Evans: adapted from his current O’Reilly book Optimizing Java.

Learn More

Blockchain

May dates

Dublin, Cork and Galway

Courses designed, written & presented by Fintech expert, incorporating Ethereum & Corda

Learn More

Linux Certification

April, May and June dates

Cork

Linux Professional Institute and CompTIA accredited courses: Linux Essentials, LPIC-1 and LPIC-2

Learn More

Service Manager

15-17 May

Dublin

Professional Cloud Service Manager Certification training - ITIL in the Cloud. Our best-selling cloud course

Learn More

Newsletter

Stay up to date, receive updates on scheduled dates, new courses, offers, and events.

Subscribe to our Newsletter