Cyber Stars (Critical National Infrastructure) Cyber Stars is the first education and awareness programme with an official qualification in cyber security awareness for those working within Critical National Infrastructure. As the cyber [...]
  • CYBSTAROT-QA
  • Cena na vyžádání

Cyber Stars (Critical National Infrastructure) Cyber Stars is the first education and awareness programme with an official qualification in cyber security awareness for those working within Critical National Infrastructure. As the cyber threats to CNI continue to increase and evolve it is essential that those with access to and responsibility for keeping Operational Technology secure, to fully understand cyber security threats within the relevant and specific context. Generic IT based cyber awareness training often misses the requirement for those working in more operational technology roles and our curriculum has been developed with leading providers of CNI in the United Kingdom to ensure complete relevance to those working in role. Cyber Stars CNI curriculums are specific to individual sector risks and support NIST Directive requirements associated with cyber security awareness within CNI. Cyber Stars training has been delivered successfully in over 30 countries and over 250,000 individuals have participated in one of our training programmes. Each Cyber Stars course is bespoke, as sector and organisational threats are often subtly different. This impacts our curriculum to ensure it is relevant and provides actionable behavioural changes that will make a difference to both the personal and corporate environment. Threat types used and case studies included in the programme will always be relevant to sector and ensure increased levels of engagement through learner recognition of relevance.Cyber Stars AssessmentThe Cyber Stars assessment is undertaken directly with our partner IntQual, and managed independently outside of QA, due to its OFQUAL regulation.Contact Cyber@intqual-pro.com for any assessment related queries.

  • The Scale and Evolution of Cyber Threat
  • Threat Actors and Motivations
  • Threat Techniques (Social Engineering, Malware, Network Attack, Physical Access)
  • Home and Mobile Working Threats (Wifi, VPN, Encryption, USB, password security)
  • Social Media Safety (Digital footprint leakage and protection)
  • Incident Response and Business Continuity (in scoping with organisation
  • for messaging)
  • Supply Chain Threat (if relevant to business model)
  • Policy Development and Implementation (in scoping with organisation for messaging)

Mám zájem o vybraný QA kurz