Digital Security Training: Cyber Threats and Risk Management

blur

Learn Path Description

Understand digital security and protect against cyber threats worldwide information security market is forecast to reach $170.4 billion in 2022 which will in turn increase demand for digital security knowledge and skills. While cyber attacks are on the rise, many organizations have unprotected data and insufficient cyber security protocols, making them vulnerable to data loss. To fight this, businesses must priorities enacting digital security best practices. This ExpertTrack will provide you with a comprehensive knowledge of digital information security concepts and an understanding of their application. You’ll become an expert in the threats posed to organizations and the approaches needed to mitigate such risks. Explore cyber threats and risk management The first course in this ExpertTrack covers the fundamentals of cyber security, the different types of cyber threat, and the development of an effective security policy. Once you have covered the basics, you’ll explore IT risk management and the techniques used to mitigate threats to an organization. You’ll consider security policies, security governance, and incident response strategies, learning how to apply different approaches to various real life cyber security breaches. Investigate cryptography and access control Take the chance to explore the key principles of access control, password security, and biometrics, giving you an understanding of how access security breaches typically take place and what can be done to prevent them. There will be an opportunity to unpack the basic principles of cryptography and analyze different encryption methods. Then you’ll analyze relevant laws and regulations, including GDPR and the Computer Misuse Act (CMA), enabling you to work confidently within guidelines to uphold a high level of data security. With the rise of cloud-based systems and Bring Your Own Device policies (BYOD), there are new risks and vulnerabilities to consider. In this course you will discuss these risks and how they affect individuals and organizations. Prepare for the future of cyber security and threat management The final course in the ExpertTrack looks at the future of cyber security and threat management, taking into account the increased vulnerabilities of high technology systems. To complete your digital security training, you’ll critically discuss the sophistication of growing threats to organizations that conduct their business online and whether or not a bulletproof solution for these threats is possible. 
 

Skills You Will Gain

Courses In This Learning Path

blur
icon

Total Duration

2 weeks

icon

Level

Beginner

icon

Learn Type

Certifications

The Cyber Security Landscape

Cyberattacks can have serious consequences for individuals, governments, and businesses. Cyber security is not something that can be ignored. This course will introduce you to the key issues, challenges, and opportunities that are shaping the global cyber security landscape today. This course will cover emerging cyber security threats, cyber attacks, the potential impact they could have on organizations, and the specific threats presented by new technologies. FutureLearn has made it possible to earn a degree since 2017. This course can be viewed as a beginner course in a degree program. It will give you an idea of what the subject is like, but it also gives you the opportunity to start your journey towards a degree. You can join FutureLearn's program if you like this course and start to work towards your degree.

You don't have to complete a degree in order to take this course.

blur
icon

Total Duration

2 weeks

icon

Level

Beginner

icon

Learn Type

Certifications

Risk Management and Security Vulnerabilities

This course will help you understand risk and risk assessment strategies. It will also equip you with the skills to protect digital environments professionally. Learn how to assess and identify risk levels and integrate IT risk management techniques to protect your organization and decision-making processes. You will gain a critical understanding of organisational culture and how it affects risk management by the end. Understanding leadership styles and how they impact cyber-awareness will help you to understand the role of risk management in improving your culture. To understand digital security risks, you'll learn how to identify and assess threats and vulnerabilities, as well as what they are. The course will then explore the risk management model which explains the steps involved in managing risk. The course will cover the different types of threats: human, environmental and technical errors as well as deliberate acts. Examine risk appetite and the way organisations determine the acceptable risk level to achieve their goals. You will examine emerging risks, which are often described as high-impact, low likelihood, and explore the key challenges involved in managing them, including the complexity of cyberspace and the lack of historical data.

You'll also learn how to create a culture of digital security where employees are aware that information protection is an integral part their job, daily habits and conduct.

blur
icon

Total Duration

2 weeks

icon

Level

Intermediate

icon

Learn Type

Certifications

Information Security Policy and Management

Information Security policies are intended to assist individuals in an organization to adopt behaviors that reduce the likelihood of a digital security breach. This course will teach you how to navigate and create information security policies for your company. The reasons why organisations have Information Security Policies will be discussed. These could include the detection and prevention of misused data, computer systems and applications. You will also examine the Information Security Management System, which is a system that manages sensitive information to ensure its security. Learn the fundamental principles of access control. This includes password security issues and control architecture models. You'll also learn about biometrics, which is a method of authenticating people through unique biological characteristics. The process of preparing an organisation for, detecting, responding to, and recovering from natural or man-made threats to its information security assets will be covered in contingency planning (CP). You'll also learn about incident response, the process an organization uses to respond and manage cyber-attacks. We'll discuss the objectives of an incident response strategy as well as the stages and the roles of the different teams. The final step is to create an effective plan for incident response.

blur
icon

Total Duration

2 weeks

icon

Level

Beginner

icon

Learn Type

Certifications

Cryptography and Digital Certificates

Learn the fundamental principles of encryption and cryptography, and how you can apply them to improve cyber security models in real life.

You will examine different encryption methods, digital certificates and signatures, as well as relevant cyber security laws.

Learn how hash functions can be used to compress message lengths to create a short, random-looking message digest.

The course will also cover the two main types of encryption: symmetric encryption and asymmetric encryption. This course will also cover digital signatures, certificates, and other protocols that are used to secure communications over networks.

Learn how to defend yourself against different attacks on cryptosystems.

We'll be discussing the various types of cybercrime that organisations face, as well as cyber-dependent crimes like hacking and disruption to computer functionality.

The legal response to cybercrime, including the applicable cyber laws in the EU, will also be examined.

The course ends with an overview of cloud security issues. It examines the emergence and use of Bring Your Own Device Policies (BYOD), as well as the rising trend of employees using personal devices.

blur
icon

Total Duration

2 weeks

icon

Level

Intermediate

icon

Learn Type

Certifications

The Future of Cyber Security and Emerging Technologies

This course will explore cyber security's future and what organisations need to do in response to cyber incidents. You will have the opportunity to learn about emerging technologies and the security challenges they present. The sophistication of the threats posed to organizations that do business online will be discussed and a solution may be possible. Consider the responsibilities of corporate boards and public-sector boards in cyber and information security oversight. Then, you'll explore critical infrastructure protection. This will include how it relates the response to serious incidents that affect the infrastructure of a country or region. The board's role, the importance and impact of cross-organisational engagement, as well as the role of the business sector that is digitally dependent, will be discussed.

Analyze the Gartner Hype Cycle to learn more about the impact of emerging technologies on cyber security. It outlines five emerging technology movements that blur lines between humans, machines and computers. Key reasons that new technology systems are more susceptible to cyber attacks will be discussed. These vulnerabilities can be in the software and hardware components as well as human error. The future of threat management will also be discussed, as well as the impact it will have on corporate security, and whether employees and workplaces will be able keep up.

blur