Help secure your organisation as you discover potential cyber security threats and the frameworks you can use to prevent them.
Duration
3 weeksWeekly study
3 hours
Cyber Security Incident Response for Managers
The content of the following course has been certified by the CPD Certification Service as conforming to continuing professional development principles. Find out more.
Learn how to counteract cyber security threats within your business
One of the highest threats an organisation can face is a cyber security incident. As well as the direct damage caused by a hacker or malicious software, businesses may face severe criticism or sanctions from regulatory bodies and serious reputational damage as a result.
This practical, three-week course will introduce you to the potential cyber security threats you could face and will help you to identify incident frameworks to use to counteract these threats.
Discover the types of cyber threats your organisation may encounter
You’ll explore the kinds of cyber threats that businesses and organisations may face, such as computer viruses, data breaches, and Denial of Service (DoS) attacks.
These are threats that ultimately seek to damage data, steal data, or disrupt digital life in general.
You’ll then gain an insight into how to report these incidents, and to whom, including appropriate legal and regulatory authorities.
Identify cyber security incident response frameworks
You’ll explore a wide array of cyber security incident frameworks used to help reduce the harm and impact caused by incidents, and to deter future attacks.
You’ll also gain an understanding of the legal and regulatory implications of a cyber security incident response.
Learn from a cyber security expert at PA Consulting
Throughout the course, you’ll be under the guidance of Jim Metcalfe, a cyber security incident responder at PA Consulting who has assisted many organisations on their response to cyber security incidents.
Syllabus
Week 1
Background to cyber security incident response
Introduction
Welcome to the course!
Legal and Compliance
A look at the legal and compliance issues that need to be considered in cyber security incident response.
Reporting to The Information Commisioner's Office
Understanding what and when we need to report a breach to the Information Commisioner's Office.
Reporting Criminal Matters
How do we report criminal matters in cyber incident response?
National Cyber Security Centre
Introducing the National Cyber Security Centre.
End of Week Test
What have we learnt this week?
Points for Discussion
Let us discuss what we have learned this week.
Week 2
What are the threats that organisations face?
Introduction
Welcome to week two! This week we will be explaining and discussing some of the threats that an organisation may face.
Current trends
A look at the current cyber security threats trending in the United Kingdom.
Attacker's motivations
What motivates the attacker?
Types of attacker
Who are the attackers? Let us discuss two key individuals and their aims.
Key personnel in the organisation
Who are the key players in a an organisation and what particular threats do they face?
Social Engineering?
Let us discuss social engineering and what it entails. Let us also have a look at a phishing email and see what happens when you click on it!
Malicious software
Malware remains one of the greatest risks your organisation faces. What is it and what happens when you are infected?
Applying threat intelligence
What is threat intelligence?
End of week quiz
Let's check on what we have learned this week
End of week discussion
Do you have any points for discussion?
Week 3
How do we manage our response to cyber security incidents?
Introduction
Overview of this week's content.
Cyber Security Incident Response Frameworks
What are cyber security incident response frameworks?
CREST Framework
Using the CREST Framework as our template, we are going to discuss the different steps and how they reflect on a cyber security incident from the preperation, response and follow up.
End of Course Test
This is it - the end of three weeks learning boiled down into one test! Good luck!
Course Conclusion
Thank you for your time and efforts these past three weeks.
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explain the legal and regulatory implications on the cyber security incident response cycle.
- Identify the threats that organisations face.
- Report to the appropriate legal and regulatory authorities.
- Explore cyber security incident frameworks.
Who is the course for?
This course is designed for anyone interested in cyber security.
You may be at the start of your career or already in a role that requires an understanding of the cyber security incident response process.
Who will you learn with?
Jim is a digital forensic and incident response investigator working primarily in law enforcement casework, interpreting evidence from all types of digital platforms.
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn
Learner reviews
Learner reviews cannot be loaded due to your cookie settings. Please and refresh the page to view this content.