Training Archive
The CISSP® (Certified Information Systems Security Professional) qualification is one of the most respected certifications in the information security industry, demonstrating an advanced knowledge of cyber security. We recently discussed the benefits of becoming a CISSP. Now, we turn our attention to the structure of …
Organisations are always looking for ways to improve their security practices, and one of the most effective ways to achieve this is by providing employees with cyber security training. A Lucy Security study found that 96% of respondents agreed that a …
The (ISC)² 2022 Cybersecurity Workforce Study reported that 3.4 million more workers are required to meet the global cyber security skills gap. This is a huge employment opportunity, but do you know what knowledge and skills you need to develop …
Implementing an ISO 27001-compliant ISMS (information security management system) can seem complex, and it’s often difficult to know how the Standard’s specifications should be applied to your organisation. Failure to understand or comply with the requirements of the Standard could …
There has never been a better time to start a career in cyber security. Organisations’ reliance on IT technical solutions has only increased with the switch to remote working, creating a massive demand for qualified personnel. But what qualifications do …
The need for experienced and qualified cyber security professionals is a highlight of Cybersecurity Career Awareness Week, led by NICE (National Initiative for Cybersecurity Education). This campaign is part of Cybersecurity Awareness Month 2021, which is focused on empowering individuals …
Microsoft Azure is the Cloud platform for delivering Microsoft Office 365 client services such as Outlook, OneDrive, SharePoint, Teams and the Office applications. With over 250 million Office 365 users worldwide, there is a huge demand for appropriately qualified professionals to install, secure and …
With the COVID-19 pandemic forcing office workers around the world to work from home, organisations have faced a cyber security challenge like no other. Entire systems had to be overhauled, additional controls have been adopted to prevent cyber attacks and …
Information security professionals spend much of their time developing ways to prevent cyber attacks, but did you know that the majority of data breaches are caused by an employee misplacing, stealing or being tricked into handing over sensitive information? These kinds …
Organisations often fall into the trap of lumping cyber security together with their other IT functions. Although they are obviously connected – anti-malware, firewalls and a host of other technologies are a core part of cyber security – there is …