MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
With a focus on practical skills throughout, this course provides the ability to apply skills as well as understand them.
This course is part of the FinTech for Finance and Business Leaders Professional Certificate.
What you'll learn
- How to facilitate a risk assessment to identify the potential threats and the vulnerabilities they may exploit and the business impacts of a cyber-attack.
- Recognise that the risks are constantly changing and the need for continuous process improvement. Including how to monitor and report on the effectiveness of the cyber/information security practices.
- Understand how to manage an incident and the processes required to effectively respond and recover.
- Understand that effective security protection is a combination of people, process and technology and how to create a culture of cyber and information security.
- Understand the physical and logical access controls which should be implemented to adequately and appropriately protect the organisation’s information and technology resources.
- Understand the potential risk responses and mitigation actions to appropriately and adequately protect the business from the identified cyber risks.
Syllabus
1. Introduction
- Objectives of the course
- Outline of the cyber threat
- What’s different about cyber
2. The basic hygiene factors
- Secure configuration of IT infrastructure
- Malware protection
- Configuring network devices securely
3. Approach and effective access controls
- Implement approaches and effective access controls
- The importance of 2 factor authentication
4. Understand risks
- Principles of risk management
- Manging the risks effectively
5. Understand and manage third-party supplier risks
- Manging the full supply chain
- Information value and sensitivity
- Supplier impacts on service delivery
6. Understand and manage third-party supplier risks
- Manging the full supply chain
- Encouraging a cyber-security aware culture
- Words into actions
7. Respond and recovery
- Incident management capability
- Respond and recover plan for breaches
8. Continuous improvement
- The need for performance monitoring
- Defining appropriate KPIs
- Performance dashboard
9. Skills and resources
- The importance of access to the right skills
- The need for up-to-date training
10. Concluding themes
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.