General security training - what type of cyber security training do you need? Part 3
By Samantha Allen 25 Jul 2019
Intro - importance of cyber security
As mentioned in our previous articles HERE, HERE, and HERE no business is safe from cybercrime, and cyberattacks can happen when you least expect it. But having the right training can prevent or fix all kinds of nightmare issues. Not only will it keep your customers safe, but your own company data will be safe. And if the worst-case scenario does happen, cyber security training can help you and your team to respond and resolve the problem quickly and easily.
Read on for a brief overview of 5 more cyber security courses available, so you can choose the right training course for you or your team members.
1. Microsoft 365 Security Administrator
This Microsoft 365 Security Administrator course will teach you how to secure user access to your organisation’s resources. Focussing on identity and access management, you‘ll learn how to protect against credential compromise. You’ll learn about user password protection, multi-factor authentication, enabling Azure Identity Protection, configuring Active Directory federation services, setting up and using Azure AD Connect, and Conditional Access. You’ll also learn how to manage external access to your Microsoft 365 system.
THIS IS GOOD FOR: managing Microsoft 365 in your organisation.
2. Network Security Foundation
As organisations grow, the importance of network security increases. With computers and devices linked across enterprise-wide and virtual private networks, the dangers to your data grows considerably. This course provides an essential foundation training needed to secure your network security.
You’ll learn about the fundamental security concepts, security policy management and end-to-end network security. You’ll be able to analyse the risks to networks and the appropriate countermeasures to reduce malicious attacks on your network.
THIS IS GOOD FOR: addressing the cyber threat lifecycle and managing your organisation’s network security.
3. Advanced Web Hacking
Staying up-to-date with the latest vulnerabilities and exploits can be a real challenge for IT security professionals. As well as knowing a vulnerability from a high level perspective, a good security professional should also demonstrate the impact of the vulnerability. This course will give you access to a state-of-art Hacklab where you will establish, assess, exploit and then post exploit vulnerabilities within the Hacklab.
THIS IS GOOD FOR: IT security professionals to bridge the gap between understanding a vulnerability and being able to fully exploit it.
4. Application Security for Developers
Developing applications is often part of everyday business activity, but comes with security risks. This highly-practical course is ideal for web developers, security auditors, penetration testers, security managers and anyone else looking to learn about writing secure code or to audit code against security flaws. Each and every vulnerability is covered in-depth as well as a variety of the best security practices and defences which should be kept in mind while developing applications.
As well as covering industry standards such as OWASP Top 10 and SANS top 25 security issues, this course also talks about real world issues which aren’t mentioned in these lists. With an emphasis on the principles, this course doesn’t focus on a specific web development language or technology, but includes examples from PHP, .NET, classic ASP and Java.
THIS IS GOOD FOR: Those involved in developing applications, including web developers, security auditors, penetration testers and security managers.
5. Information Security Management Principles
This BCS Certificate in Information Security Management Principles course will provide you with the knowledge and skills required to manage information security, information assurance or information risk based processes. This CiSMP course is aligned with the latest national information assurance frameworks (IAMM), as well as ISO/IEC 27002 & 27001; the code of practice and standard for information security.
Find the Information Security Management Principles training course.
THIS IS GOOD FOR: Those looking to achieve a BCS Certificate in Information Security Management Principles.
This is just a small snippet of the variety of cyber security courses available. Over the last few weeks we highlighted a wide range of cyber security courses, but there are plenty more training courses to be found.
At Go.Courses we provide hundreds of training courses, which are all delivered by expert instructors. The links in the article above point to training course locations all around the UK and Europe, and our instructors can also come right to your office. We also offer 1-1 training, so no request is too small.
Still unsure which is the right training course for you? Drop us a message and let’s chat.