Error message

  • Warning: count(): Parameter must be an array or an object that implements Countable in _form_validate() (line 1441 of /hermes/bosnacweb02/bosnacweb02as/b1686/ipg.alrabiagate34164/londoncollegeforinternationalstudies/includes/form.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /hermes/bosnacweb02/bosnacweb02as/b1686/ipg.alrabiagate34164/londoncollegeforinternationalstudies/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in _menu_load_objects() (line 579 of /hermes/bosnacweb02/bosnacweb02as/b1686/ipg.alrabiagate34164/londoncollegeforinternationalstudies/includes/menu.inc).

IT & Computer Science

Digital Security Training

 

Understand digital security and protect against cyber threats

The worldwide information security market is forecast to reach $170.4 billion in 2022 which will in turn increase demand for digital security knowledge and skills.

While cyber attacks are on the rise, many organisations have unprotected data and insufficient cyber security protocols, making them vulnerable to data loss. To fight this, businesses must prioritise enacting digital security best practices.

This ExpertTrack will provide you with a comprehensive knowledge of digital information security concepts and an understanding of their application. You’ll become an expert in the threats posed to organisations and the approaches needed to mitigate such risks.

Explore cyber threats and risk management

The first course in this ExpertTrack covers the fundamentals of cyber security, the different types of cyber threat, and the development of an effective security policy.

Once you have covered the basics, you’ll explore IT risk management and the techniques used to mitigate threats to an organisation.

You’ll consider security policies, security governance, and incident response strategies, learning how to apply different approaches to various real life cyber security breaches.

Investigate cryptography and access control

Take the chance to explore the key principles of access control, password security, and biometrics, giving you an understanding of how access security breaches typically take place and what can be done to prevent them.

There will be an opportunity to unpack the basic principles of cryptography and analyse different encryption methods.

Then you’ll analyse relevant laws and regulations, including GDPR and the Computer Misuse Act (CMA), enabling you to work confidently within guidelines to uphold a high level of data security.

With the rise of cloud-based systems and Bring Your Own Device policies (BYOD), there are new risks and vulnerabilities to consider. In this course you will discuss these risks and how they affect individuals and organisations.

Prepare for the future of cyber security and threat management

The final course in the ExpertTrack looks at the future of cyber security and threat management, taking into account the increased vulnerabilities of high technology systems.

To complete your digital security training, you’ll critically discuss the sophistication of growing threats to organisations that conduct their business online and whether or not a bulletproof solution for these threats is possible.