Cyber Security Training

Get complete protection for your network with our Cyber Security Training.

Cyber Security Training for Your Team

Staff Cyber Security Training is a requirement for achieving a Cyber Essentials certification. Whilst this doesn’t necessarily have to be formal classroom training and can be provided by line managers/supervisors, it is more beneficial to have this training in the presence of cyber security experts.

A Link-IT led training session helps to provide a clearer picture of the human factors that affect your organisation’s cyber security level through detailed discussions. If you choose our Cyber Security Training, you will benefit from the expertise of a team of Backup and Disaster Recovery specialists with over 20 years of experience in business IT.

FAQ

Discover the answers to some Frequently Asked Questions about our Cyber Security Training.

How long is the training?

The Cyber Security Training session will last for 2 hours.

How much does it cost?

It costs £500 for a 2-hour training session.

What is included in the price?

Our Cyber Security Awareness Training outlines the threats and vulnerabilities that could affect your business. We cover the three pillars of IT security, Cyber Essentials and IASME Governance and how to protect your company data.

Where will the training be held?

We are happy to provide onsite training, or we can host it here at our Basingstoke training facility.

Will there be a lunch break?

No, there will not be a lunch break.

Who should attend this training?

The training can benefit anybody, but in some instances, companies may like Business Leaders and Managers to attend.

How many people (max) can attend the session?

A maximum of 20 people can attend the Cyber Security Training session.

What qualifications / accreditations do Link IT have?

Some of our qualifications and accreditations include: IASME Governance, Cyber Essentials CB and Cyber Plus CB. We are backup and disaster recovery specialists with over 20 years’ experience in business IT.

Are there any other services I can add on to my training?

You can add the Backup and Disaster Recovery Certification to your training.

What additional services can you offer on the day?

We can offer a free external vulnerability scan on the day of your Cyber Security Training.

Are there other courses I can complete after doing this training?

No, there are not currently any additional courses to complete.

Are trainees left with any materials at the end of the session? Or guided on where to go next for more info?

All attendees will be left with a copy of the presentation, which they can refer to for more information.

Why should I use Link IT for my cyber security training?

We are proven in our experience as an MSP and specialists in disaster recovery and cyber security, so we are fully qualified to carry out Cyber Security Training.

Training Course Overview

Principles
Principles
Principles
Learning to use the CIA principles, standing for confidentiality, integrity and availability.
Assets
Assets
Assets
Understanding that information itself is an asset, and it’s crucial to adding value.
Threats
Threats
Threats
Learning that Britain is being targeted by up to a thousand cyber attacks every hour.
Attacks
Attacks
Attacks
Understanding that cyber attacks take many forms and can cause major financial loss in your organisation.
Enemies
Enemies
Enemies
Understanding your enemies and how they can gain access to your IT systems.
Malware
Malware
Malware
Understanding the different software that can be used to harm computers in different ways.
Phishing
Phishing
Phishing
Learning how to spot attempts by attackers to steal valuable information by pretending to be a trustworthy part.
Responsibilities
Responsibilities
Responsibilities
Learning about the role of the Information System Policy and Data Security Policy.
Information Security
Information Security
Information Security
Understanding the role that legislation, personnel security, access management and asset management have on your information security policy.
Data Protection
Data Protection
Data Protection
Understanding that this policy has been written based around eight fundamental principles of good information handling.
Physical Security
Physical Security
Physical Security
Understanding that physical security is important in protecting against a range of threats and vulnerabilities, including terrorism.
Data Security
Data Security
Data Security
Making sure you are aware of how to use passwords, remote access, local storage and removable media securely.
Monitoring
Monitoring
Monitoring
Understanding how to use logins, building access and equipment in a responsible manner.
Prevention
Prevention
Prevention
Learning more about the preventative measures you can take to prevent a cyber attack.

Book Your Training Session

Complete this form to request a Cyber Security Training session. We will be in touch to confirm a date, time and location. You will not be added to any marketing lists unless you request to do so. You can view our privacy policy here.
  • This field is for validation purposes and should be left unchanged.

Start typing and press Enter to search