Course Duration: 2h (approx) online training + self-directed learning and activities + final assessment.
Cyber crime and cyber security breaches are a serious threat to all types of businesses and charities. Organisations can lose money, data or other assets and suffer both significant short-term disruption and long-term reputational damage. That’s why it’s important that all staff, especially senior leaders, have a good understanding of how to develop and implement protective measures.
This course provides you with the knowledge and skills to understand what cyber security is, the different types of cyber threats and the measures you can take to protect your organisation from harm.
Split into bite-sized modules, the training has been designed to provide maximum learning potential in the leanest, most cost-effective and most time-efficient manner. It has been produced in high-quality remote video CPD format which is accessible on any device, any time, anywhere.
Created by KryptoKloud, an independent cyber operations and intelligence company, this course is split into seven modules. The course consists of learning through video modules, completion of tasks, further reading and viewing external resources. Please consider this when planning and allocating your time. To successfully understand and achieve the objectives from the course, learners are expected to engage in all aspects of the learning process and complete all relevant activities to ensure they can successfully apply the knowledge and skills they have gained in their own setting.
Learning objectives
- Understanding why the education sector is a common target for cyber criminals and the motivations behind a cyber-attack.
- Recognising what is meant by a digital identity, how much information exists about us online and how easy it is to leave a digital footprint which can be exploited by criminals.
- Identifying different types of cyber crime including phishing, malware and ransomware attacks and the protection measures that can be taken.
- Understanding what constitutes a data breach, what impact it can have and the actions to take following the potential loss or theft of data.
- Recognising the role of legislation and the NCSC in cyber security and building an awareness of protection procedures which can be implemented across any digital environment.