Introduction to Cyber Security Training

In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.

£495.00

Description

Regardless of your computer experience, this class will help you become more aware of technology & related risks and what you can do to protect yourself and your organization from them. This course will help you to:
• Understand both security and compliance need and requirements.
• Recognize and avoid phishing and other social engineering attempts.
• Recognize and avoid viruses, ransomware, and other malware.
• Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.

In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks.

You will:
• Identify security compliance measures.
• Address social engineering attempts.
• Secure devices such as desktops, laptops, tablets, smartphones, and more.
• Use the Internet securely.

Target Audience
This course is designed for all users of computers, mobile devices, networks, and the
Internet, to enable them to use technology more securely and minimize digital risks,
regardless of technical ability.

Course Prerequisites
To ensure your success in this course, you should have experience with the basic use of
conventional computing technology, including desktop, laptop, or tablet computers; mobile
phones; and basic Internet functions, such as web browsing and email.

Additional information

City

All cities, Online instructor led – live sessions, Recorded Content

Date

14th July 2025, 15th Sept 2025, 18th Aug 2025

days

1, 2

Certification

Without Certification

Practice Course

No

Start Time

Overview

Why ICS from BJSL?

    • Regardless of your computer experience, this class will help you become more aware of technology & related risks and what you can do to protect yourself and your organization from them. This course will help you to:
      • Understand both security and compliance need and requirements.
      • Recognize and avoid phishing and other social engineering attempts.
      • Recognize and avoid viruses, ransomware, and other malware.
      • Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.


Who should attend this course?

This training is ideal for general office workers, analysts, auditors and architects.

Benefits

In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks.
You will:
• Identify security compliance measures.
• Address social engineering attempts.
• Secure devices such as desktops, laptops, tablets, smartphones, and more.
• Use the Internet securely.

FAQs

What is the course length?

2 days – 8 hours per day 0900 – 17:30 with a 30 minute break for lunch

What are the topics covered in this course?

Lesson 1: Identifying Security Compliance Measures
• Identify Organizational Compliance Requirements and Resources
• Identify Legal Compliance Requirements and Resources

Lesson 2: Recognizing and Addressing Social Engineering Attack
• Recognize Social Engineering Attacks
• Defend Against Social Engineering Attacks

Lesson 3: Securing Devices
• Maintain Physical Security of Devices
• Use Secure Authentication Methods
• Protect Your Data
• Defend Against Malware
• Use Wireless Devices Securely

Lesson 4: Using the Internet Securely
• Browse the Web Safely
• Use Email Securely
• Use Social Networks Securely
• Use Cloud Services Securely
• Work from Remote Locations Securely

Why should I do the Introduction to Cybersecurity?

Research continues to conclude that there is a global shortage of qualified cybersecurity professionals. This course enables candidates – including students, young professionals and career-changers – to demonstrate to employers their familiarity with foundational cybersecurity concepts as determined by cybersecurity professionals and practitioners already in the field.

Downloads

View >Cyber Security 2 day bootcamp A5

Trainer

Mr. KULJIT SINGH SARNA

(Co-Founder and Director Power Track)

Kuljeet has 22 years of Professional experience as a Consultant, Business leader, Coach, and Trainer and has worked with Global Organizations like IBM, Intel, Microsoft, CA Technologies. He brings in strong management background and versatile experience in Business Excellence, Enterprise architecture, Governance and Cyber security domains.

He is a Certified Instructor and coach, having trained more than 2000 plus participants and 40 plus organizations globally like Riyadh Bank (Saudi Arabia), MTN Telecom (Cameroon), Ooredoo Telecom (Kuwait), Adobe, Harman, MetLife, Indigo, Genpact, fiserv. His experience in various industries ranges from Banking, Financial services, Insurance, Telecom and Aviation.

Course Options

Location: -

Time: -

Price: -

Enquire Now