Cyber Security Fundamentals
What is the Cyber Security Fundamentals Qualification?
This 2-day Cyber Security Fundamentals course is a National Cyber Security Centre Certified training course (NCSC-Certified). If you do not know where to begin in your cyber security strategy, then this course will provide you with the knowledge on where to start it.
This course will provide an effective introduction to cyber security for anyone who is responsible or accountable for the protection of business assets, such as senior IT management or a Chief Information Security Officer (CISO). You will cover the types of personal data that you are trying to protect, who you are trying to protect it from (Attack Profiling), the reason why they attack, how you can protect yourself (and your business) and how to be prepared.
Who is this Qualification for?
This Cyber Security Fundamentals course is great for professionals who may or may not have an information security background, but who have the opportunity to make decisions and determine investment in appropriate security measures.
An example of your role might include Senior management from public, commercial and corporate sector organisations. Small-Medium sized business owners. C-level professionals, particularly CISO, CIO, CSO or CRO. Head/Director of IT or Security. Risk or Compliance Managers, and Department or Team Leads, to name a few.
Cyber Security Fundamentals Benefits
- Learn how to explain to executives the importance of cyber security in an organisation.
- Understand why organisational behaviour must adopt proportionate but effective cyber security practices.
- Identify measures to secure your organisation’s digital footprint including risks associated with user information sharing via social media.
- Gain insight to the cyber threat landscape and real-world consequences of ignoring organisational cyber security risk.
- Translate how real-world hacking case studies or data breaches relate to an organisation’s current cyber security measures and the potential consequences.
- Demystify cyber security industry jargon and associated media hype – including understanding what malware is and what it’s capable of.
- Discover the methodologies an attacker might adopt to breach an organisation’s security to expand its access.
- Demonstrate an ability to promote the message of the necessary safe and responsible use of information technology and handling of corporate intellectual property.
Accreditation / Qualification(s) offered
Successful completion of this course will mean you will be awarded the NCSC-Certified Training at Awareness Level with IISP Core Skills A1, A2, A3, A4, A5, A6, A7, B1, B2, C1, C2, D1, D2, E1, E2, E3, F1, F2, G1, H1, H2.
What This Course Includes
This price includes course registration and NCSC-Certified Certificate.
Delivery Partner
This course will be delivered by our partners, Protection Group International, as part of our Cyber Alliance who will be the training provider of this course.
Delivery method:
Virtual ClassroomInstructor-led course
- Register your interest
- This is a virtual course with a live instructor. It includes interaction and group-work to embed learning. We encourage use of cameras, and have regular breaks to maintain freshness and engagement.
Small Classes
NCSC Certificate
Does not Expire


All prices are per person and exclude VAT.
By the end of this course, you will be better informed of the potential business risks associated with cyber security. You will be able to determine what you are trying to protect, who are you protecting it from, and what measures are available to protect and adequately prepare your organisation.
There are no entry requirements for this course however, knowledge of business practices within your organisation, your organisation’s risk management processes and any IT user security policies would benefit you.
This training can be tailored to any industry, or for a defined audience with various durations. Example topics include:
- Definitions – Cybersecurity and Information Security
What are you trying to protect?
- Personal Data and Data Protection
Who are we protecting it from?
- Actors and Motivation – Attack Profiling
Why do they attack?
- State Threats
- Social Media
- The Deep Web
- Proportionality of Attack
- Cyber Threat Methodology
- Open-Source Intelligence (OSINT)
- Social Engineering
- Common Attack Techniques
- APTs / Cyber Criminals
- Phone Tracking, Geotags and Location Data
- Data Leakage (Wi-Fi and GPS)
- The Deep Web
- Cryptocurrency
- Supply Chain Threats
How can we protect ourselves?
- Passwords and Passphrases
- Maintaining Awareness
- Patching and Updating
- Privileged Account Management
- Managing your Digital Footprint
How can we be prepared?
- Cyber Leadership
- Risk Management
- Business Continuity, Disaster Recovery and Incident Response
Upcoming dates for Cyber Security Fundamentals | NCSC-Certified Course
Click here to register your interest in Cyber Security Fundamentals.
All prices are per person and exclude VAT.
VAT will be calculated at checkout.