Categories

Summary

There are fantastic benefits to embracing technology and working securely online in health and social care. Technology allows greater and faster information sharing, so we can improve the quality of care and support which we provide e.g. personalised care planning, transfers of care, viewing medications, etc. Individuals can fully participate and have better access to, and input into, their records. However, as we use technology more, we must continue to do all we can to keep data safe and secure, ensuring that disruption to care and support at best is avoided or that any disruption is minimised.  

Therefor Cyber security is the safeguards taken to avoid or reduce any disruption from an attack on data, computers or mobile devices. Cyber security covers not only safeguarding confidentiality and privacy, but also the availability and integrity of data, both of which are vital for the quality and safety of care. 

Objectives and target group

Who should attend? 

  • Managers of all companies and institutions. 
  • All employees in the management of institutions and companies. 
  • Information security department officials. 
  • All interested in learning ways to protect information. 
  • Graduates and students of business schools, and specialists in the development of information protection programs. 

 

How attendees will benefit? 

After completion of the programme, delegates will be able to: 

  • Explain basic cyber security terminology; have skills for keeping up to date on cyber security issues; and be able to identify information assets. 
  • Describe basic authentication mechanisms; have skills to improve their password security; and be aware of alternative authentication methods. 
  • Identify main malware types; awareness of different malware propagation methods; and skills for preventing malware infections. 
  • Identify main malware types; awareness of different malware propagation methods; and skills for preventing malware infections. 
  • Describe cryptography terminology; be able to use cryptography for email; be aware of applications of cryptography. 
  • Demonstrate understanding of firewalls, virtual private networks and network intrusion detection and prevention technologies. 
  • Describe legal and regulatory issues relating to cyber security; and understand how to recover from security failures. 
  • Apply basic risk analysis and management techniques. 

Course Content

  • Defining Industrial Cybersecurity 
  • Risk Assessment 
  • Threat landscape: terminology, cyber security threats, keeping up to date 
  • Authentication: access control, passwords, two-factor authentication 
  • Understanding TCP/IP, Hackers, and Malware 
  • Malware: types of malware, attack vectors, preventing infection  
  • Networking and communications: fundamentals, security challenges, standards 
  • Cryptography: symmetric and asymmetric cryptography, applications 
  • Security Policies, Programs, and Procedures 
  • Network security: firewalls, virtual private networks, intrusion detection / prevention 
  • When your defenses fail : cyber security laws, recovering from attacks 
  • Managing security risks: risk analysis and management 

Course Date

2024-11-11

2025-02-10

2025-05-12

2025-08-11

Course Cost

Note / Price varies according to the selected city

Members NO. : 1
£4600 / Member

Members NO. : 2 - 3
£3680 / Member

Members NO. : + 3
£2852 / Member

Related Course

Featured

Excel Business Intelligence: Power Query Training Programme

2024-11-11

2025-02-10

2025-05-12

2025-08-11

£4600 £4600

$data['course']