This course is designed to provide learners with the knowledge and skills to protect their information assets and systems from cyber threats.
This course is designed to provide learners with the knowledge and skills to protect their information assets and systems from cyber threats. The course covers the five technical controls of Cyber Essentials Plus: firewalls, secure configuration, user access control, malware protection, and patch management. The course also covers the legal and regulatory aspects of cyber security, such as the Data Protection Act, the Computer Misuse Act, and the GDPR.
The course is suitable for anyone who wants to improve their cyber security awareness and practice, as well as for those who are preparing for the Cyber Essentials Plus accreditation.
Introduction to Cyber Security
Firewalls and Internet Gateways
Secure Configuration
User Access Control
Malware Protection
Patch Management
Legal and Regulatory Aspects of Cyber Security
Cyber Essentials Plus Certification Exam Preparation
Please note: A minimum of 4 delegates are required to run this course. If this is not met then this course may be rescheduled.
Director of Cyber Security Services, inTEC Business
Owen Collar is a seasoned cyber security professional with over 26 years of experience. Specializing in operating systems, network infrastructure, and cyber security, Owen has a strong background in developing and implementing robust security solutions. He holds several prestigious qualifications, including GCHQ & NCSC Recognised Cyber Scheme Team Member, and has extensive experience in GDPR assessment, Cyber Essentials, and technical cyber auditing.
Currently, Owen serves as the Director of Cyber Security Services at inTEC GROUP, where he has been instrumental in establishing the company as a leading IASME Certification Body. His previous roles include Group Head of Cyber Security Audit at inTEC and Technical Director at Miller Waite Limited, where he led technical teams and implemented advanced security measures.
Owen is proficient in multiple operating systems and has a proven track record in leadership, strategic thinking, and risk management. He is committed to staying at the forefront of technology to provide top-notch cyber security solutions