Certified Network Defender Certification
EC-Council EC-Council was formed as the result of very disheartening research after the 9/11 attack on the World Trade Center. Founder, Jay Bavisi, after watching the attacks unfold, postured the question, what if a similar attack were to be carried out on the Cyber battlefield? Would the information security community have the tools and resources at their disposal to thwart such an attack? At that time, the answer was no. EC-Council, officially incorporated as the International Council of E-Commerce Consultants was formed to create information security training and certification programs to help the very community our connected economy would rely on to save them from a devastating Cyber Attack. EC-Council rapidly gained the support of top researchers and subject matter experts around the world and launched its first Information Security Program, the Certified Ethical Hacker. With this ever-growing team of subject matter experts and InfoSec researchers, EC-Council continued to build various standards, certifications and training programs in the electronic commerce and information security space.
ATHE Level 4 Diploma in Information Security and Assurance
The School of Information Risk Management Information security is widely recognised as an international priority, with hacking, malicious code, and data theft being just three of the many reasons why it's vital in the design, development and implementation of today’s IT systems. This course delivers a view of security threats and solutions, alongside an essential background in wider IT topics. This is particularly important considering the current shortage of related skills in the marketplace.
Students will enhance knowledge of a variety of computing disciplines, including analysis and design, programming, networking and information systems. The qualification will focus on the design, configuration, management and support of all types of computer networks, distributed applications based on risk assessments.
The Level 4 Diploma in Information Security and Assurance will develop students’ intellectual and practical skills and will promote the development of students’ ability to analyse, synthesise and evaluate information security principles in a wide range of appropriate contexts.
The two core features of this qualification are:
The development of students’ lifelong learning skills including self-evaluation and reflection with the aim of placing students in the best position to make informed decisions about their future professional career
The development of decision-making skills.
Transferable skills that are necessary for a career in information security are developed through engagement with real life and virtual security issues, enabling the study of key aspects of security and distributed applications. This is complemented by external guest speakers from industry.
Cyber Security Risk Management
Method Cyber Security Ltd =Method Cyber Security was formed in late March 2018 following the launch of Method Functional Safety Ltd in early 2017.
We now have four =Method divisions focusing on Functional Safety, Process Control, Cyber Security and Product Compliance. We can now provide a comprehensive, reliable and professional Safety and Security support service to create a safer working environment for everyone.
The Holiday Inn London Heathrow
Cyber Security Risk Management
Method Cyber Security Ltd =Method Cyber Security was formed in late March 2018 following the launch of Method Functional Safety Ltd in early 2017.We now have four =Method divisions focusing on Functional Safety, Process Control, Cyber Security and Product Compliance. We can now provide a comprehensive, reliable and professional Safety and Security support service to create a safer working environment for everyone.
DPS Group, Unit 1, Lomond Business Park Baltimore Road, Glenrothes, Fife, KY6 2PJ
Other types of Cyber Security Courses:
Data Protection / GDPR Courses
The world of data protection is about to experience a seismic shift as powerful new regulations are rolled out across the European Union. The new law is the EU GDPR (EU General Data Protection Regulation), its objective is to protect EU citizens personal data, it will replace all existing national data protection legislation across the EU member states including the UK’s Data Protection Act 1998. To address the need to quickly comply with it, many new GDPR and Data Protection focused courses have recently become available. As the new law was somewhat fluid, organisations have only had a small window of opportunity in which to comply.
The new EU GDPR will impact on personal data, specifically its processing, use and storage, including voice data.
Data protection has always been a subject where course attendance by those responsible for it, within their enterprise, was a real necessity. Keeping up to date with all of the new developments and nuances of such a broad set of regulations is a tricky task.
EU GDPR comes into effect in May 2018. Non-compliance could mean fines of up to €20 million or 4% of annual turnover, whichever is the higher, for non-compliance! So clearly enterprises must ensure that they are in full compliance. One of the best ways to assure compliance is for responsible members of staff to be sent to Data Protection / GDPR focused courses, where they can learn what must be done.
In particular, for those working in IT, Cyber or Information Security, ensuring that their organisations personal data storage, processing, recording, communication and storage are in compliance is vital.
This therefore effectively means that staff attendance of courses relating to EU GDPR is non negotiable. They simply must attend, so that they can impart their up to date EU GDPR knowledge across their organisation. Projects around Data Protection can then be successfully completed with no stone left unturned!
To help key information systems and IT professionals to prepare their compliance projects, a useful guide to the EU General Data Protection Regulation can be found here!
Why is all this necessary?
EU GDPR’s objective is to confer specific rights to individuals. These rights include the right to be informed the right of access, the right to erasure the right to rectification, the right to object, the right to restrict processing, the right to data portability, and the right not to be subject to automated decision-making including profiling.
It’s all a bit of a mouthful, as you can no doubt see for yourself! This is why a formal course in Data Protection and GDPR is vital right now for those with the responsibility of ensuring data protection laws are complied with within their enterprise.
Introduction to Data Protection/GDPR Courses
Many professionals working in IT, cyber and information security must, as part of their role, keep up to date with all applicable Compliance Regulations. This applies to Compliance Officers, Programmers, Software Developers, IT Project and Program Managers and Directors too. Those in roles such as CIO (Chief Information Officer), CISO (Chief Information Security Officer) and CTO (Chief Technology Officer) will often take overall responsibility for such compliance.
EU General Data Protection Regulation (EU GDPR) Compliance
The EU GDPR is a European Union data privacy law, protecting the EU’s citizen’s personal information. Despite Brexit, it is thought that the law will continue to be adopted across the UK, even once it leaves the European Union. This is important to note for those working in Great Britain. Furthermore, if UK organisations process EU citizen’s personal data, they must still comply, regardless of where they are based!
There are certified EU General Data Protection Regulation courses available for students to attend if they need to increase their knowledge of GDPR compliance as part of their job role.
Pertinent Data Protection courses will include many elements, in outline these are as follows:
- The EU GDPR’s Background and associated terminology
- Special categories of personal data/information
- The rights of data subjects, including removal and access requests
- Controllers and data processors
- How you can provide data protection by design
- The securing of all personal data
- The reporting of any data breaches
- What is the role of the data protection officer
- A guide to performing a data protection impact assessment (DPIA)
- The transfer of personal data outside of the European Union
- What are the ultimate powers of the regulatory and supervisory bodies that oversee the law
- Data mapping exercises
- Creation of a compliance gap assessment report using a tool
Within course modules real life case studies on best practice, DPIA tools that can assess privacy risks and a GDPR compliance gap assessment tool should all be covered. An effective compliance plan can then be created.
Of course, there are many other elements too that will be covered, but there are far too many to go into any specifics just now. This is why course attendance is a must for those that have a role in ensuring organisational compliance with EU GDPR.
Organisations must individually assess GDPR to then complete a compliance gap assessment and initiate projects to ensure their compliance. Remember, this new law comes into force from May 2018!