Most popular programs
Trending now
After a course session ends, it will be archived.
This course is designed for accountancy, finance and business professionals working in all organisations from small business, large corporates or financial services or who are just interested in learning more about the vulnerabilities organisations are exposed to and the options available to protect their organisation. With a focus on practical skills throughout, this course provides the ability to apply skills as well as understand them.
How to facilitate a risk assessment to identify the potential threats and the vulnerabilities they may exploit and the business impacts of a cyber-attack.
Recognise that the risks are constantly changing and the need for continuous process improvement. Including how to monitor and report on the effectiveness of the cyber/information security practices.
Understand how to manage an incident and the processes required to effectively respond and recover.
Understand that effective security protection is a combination of people, process and technology and how to create a culture of cyber and information security.
Understand the physical and logical access controls which should be implemented to adequately and appropriately protect the organisation’s information and technology resources.
Understand the potential risk responses and mitigation actions to appropriately and adequately protect the business from the identified cyber risks.
1. Introduction
Objectives of the course
Outline of the cyber threat
What’s different about cyber
2. The basic hygiene factors
Secure configuration of IT infrastructure
Malware protection
Configuring network devices securely
3. Approach and effective access controls
Implement approaches and effective access controls
The importance of 2 factor authentication
4. Understand risks
Manging the risks effectively
5. Understand and manage third-party supplier risks
Manging the full supply chain
Information value and sensitivity
Supplier impacts on service delivery
6. Understand and manage third-party supplier risks
Manging the full supply chain
Encouraging a cyber-security aware culture
Words into actions
7. Respond and recovery
Incident management capability
Respond and recover plan for breaches
8. Continuous improvement
The need for performance monitoring
Defining appropriate KPIs
Performance dashboard
9. Skills and resources
The importance of access to the right skills
The need for up-to-date training
10. Concluding themes
Who can take this course?
Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.
Who can take this course?
Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.