
Cyber Security for Businesses
Information Governance, Legal Risk Management, and Compliance with ISO Records Management Controls
£5250.00
INTRODUCTION
In today's digitised world, organisations face increasing information threats, risks, audits, legal regulations, and compliance challenges. This highly engaging training course by Al-Majd Pathways Centre (APC) includes practical case studies and workshops to help you learn about cyber security, data protection, risk reduction, global compliance standards, and privacy requirements. It also covers the use of ISO records management and ISO information security management to provide solutions.
This Cyber Security training course equips you with the latest skills and case studies, such as managing information, audit controls, legal regulations, and standards, working safely in an online environment, and protecting sensitive and personal data. By applying these skills to your work, you'll deliver stronger and more compliant solutions for managing cyber-related risks and implementing information governance roles and responsibilities. Cybercrime ranks fourth out of five high-impact crimes in terms of cost as a percentage of the global GDP, making a focus on cyber security essential in today's data-driven environment.
This training course addresses data management principles, cyber security risks, mitigation measures, and networking essentials.
TRAINING OBJECTIVES
This training course aims to help participants achieve the following objectives:
Understand the elements of the Data Life Cycle
Identify cyber security threats
Apply cybersecurity controls to reduce risks, issues, and threats through policies, strategies, and systems
Manage increasing audit, risk, and legal compliance standards
Build solutions that meet ISO requirements in information security
Apply a holistic approach to cyber security
Understand the benefits and threats of new technologies like Cloud, Artificial Intelligence, Internet of Things, and Blockchain
TRAINING OUTLINE
Day 1: Cyber Security and Information Security Management
Introduction to cyber security
Online threats, risks, and issues
Business continuity, fraud, and disaster management
ISO 27001 and its family of standards
Data, information, and records governance
Establishing information governance, roles, and responsibilities
Day 2: Audit, Legal, Risk, and ISO Standards
Categorising Physical and Electronic Risk
Audit, legal risks, and management of compliance
Document and records management compliance
ISO 15489 Records Management review
Applying ISO 27001 Information Security controls
Developing policies, procedures, and standards
Current Threat and Trend Analysis
Day 3: Project, Implementation, and Training for the New Technologies
Key Risk Indicator (KRI)
Project implementation plans and controls
Risk and issue management
Developing a business continuity plan
Cybersecurity Incident Management
Cybersecurity Crisis Management
Day 4: Systems and IT Applications
Network Protocols and Communications
Network Access
Firewalls, application, and network security
Role-based access controls and user management
Encryption technologies and standards
Email and web security
Cyber security systems
Day 5: New Trends in Cybersecurity - Cloud, IoT, and Blockchain
Types of Cloud (public, private, hybrid)
Blockchain technology
Hacking principles
Mathematics of hacking
Vulnerabilities in systems and how they are traced
Format: On-site
Language(s): English
Duration: One week
Certificate of Completion: Upon successful completion of the program, participants will receive a Certificate of Completion from Al-Majd Pathways Centre (APC).
Get in touch with us today.
Follow
Sign-up for our newsletter
0044 7466410010
©2025 All rights reserved.