Description
Cyber Security Consultant Training Pathway Description
Cyber Security Consultant Pathway
Online learning
Complete at your own pace
Learning is delivery via IBM SkillsBuild and Udemy
Advance your cyber security career and train to become a cyber security consultant. In this pathway you will learn how to develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential cyber risks.
Who is this course for?
If you have one or more of the following training or experience:
If you have completed the Cyber Security Operations Pathway Stage One and Stage Two training. Previous military experience as a comms engineer Those with entry level experience as SOC analysts, incident response analysts, threat intelligence and ethical hackers.
What will you learn?
ISO/IEC 27001. Information Security Management System (5 hours) ISO/IEC 27001 is one of the world's most popular standards and this ISO certification is very sought after, as it demonstrates a company can be trusted with information because it has sufficient controls in place to protect it. The course explains the requirements of ISO/IEC 27001 along with the controls in Annex A of this standard to help you understand how an information security management system can be implemented, what are the requirements of this standard and what are the solutions to ensure conformity.
OR
Information Security ISMS - ISO/IEC 27001 LEAD AUDITOR (5 hours) This course will help you to decipher the technicities used in ISO 27001 standard. Certified Risk and Information System Control (CRISC-ISACA) (14 hours) This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CRISC Review Manual. Topics are arranged segment wise and aligned with the latest CRISC Review Manual. Information Systems Security for Professionals: CISSP (15.5 hours) Guard and organise information processing assets in centralised and distributed environments and carry out the daily tasks required to keep security services operating reliably and efficiently Plan for technology development, including risk, and evaluate the system design against mission requirements Understand the Software Development Life Cycle (SDLC) and how to apply security to it, and identify the security control(s) are appropriate for the development environment, and assess the effectiveness of software security Apply risk management and the principles used to support it Apply a complete and accurate method for describing a current and/or future structure and behaviour for an organisation's security processes, information security systems, personnel, and organisational sub-units Know and apply the concepts of risk assessment, risk analysis, data classification, and security awareness Comprehend the structures, transmission methods, transport formats, and security measures used to provide privacy, reliability, and accessibility for transmissions over private and public communications networks Offer greater visibility into determining who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity
About SaluteMyJob
SaluteMyJob is a social enterprise dedicated to helping ex-military individuals find jobs and career opportunities. We focus on leveraging the transferable skills and experiences of former soldiers, sailors, and airmen. SaluteMyJob offers specialised ex-military recruitment services, partnering with employers and experienced recruiters to provide guidance and resources for Service leavers and veterans. We are partners on the Click Start programme, funded by Nominet and the Institute of Coding, the Abertay cyberQuarter, SaluteMyJob, and the Cyber and Fraud Centre – Scotland and have successfully delivered an Ethical Hacking pilot project to veterans looking to upskill for a career in cybersecurity. In this pilot, the partners combined Academic learning, commercial qualifications, and professional employment support. We are now delivering course in AI, OSINT, Data Analytics among other topics.