Cybersecurity Audit Essentials 130103 Why Choose this Training Course?The Cybersecurity threats and risks have become omnipresent, at least in the news cycles. However, although the news tends to over exaggerate or better yet hyper exaggerate the actual level of risks and threats, they are there, and they can create a lot of problems to many industries and entities.As mentioned in the news, if the entity does not suffer any consequences in terms of asset damage or any other harm, due to the media focus on cyber security it can suffer heavily in terms of reputation. The examples of Facebook, Cambridge Analytica and other companies just emphasize how important it is to keep your cyber security risk in check.To be able to adequately tackle these problems, the companies and institutions need to perform Cybersecurity Audits, and this Oxford training course is the right place to acquire the knowledge on how to plan and perform the audit.This training course will feature:An Overview of Information Security standards and practicesRisk Appraisal and available methods for Risk AssessmentTechnical specification of cybersecuritySecure network architecture and intrusion detection systemsIPv6, IPv4 Configuration and RisksCase studies of Cybersecurity breaches and its consequencesWhat are the Goals?By the end of this training course, delegates will be able to:Perform risk analysis of IT security breachesGet acquainted with ISO 27001 and COBIT5Acquire the knowledge of Information Security ManagementUnderstand the approach for Crisis Management and Disaster RecoveryWho is this Training Course for?This Oxford training course is suitable to a wide range of professionals but will greatly benefit:Risk ManagersAuditorsApplication designersProduct designersMarketing and research specialistsStatistical and Research AnalystsKey Application Development and data Research PersonnelTechnology Engineers, Telecommunication engineersHow will this Training Course be Presented?This Oxford training course will utilise a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. This includes theoretical presentation of the concepts, but the emphasis will be on the exercises performed by the delegates with the guidance of the instructor, when it comes to the performance of Risk Assessments and Risk Management. The delegates will be “learning by doing” as the training course is designed around the project of preparing and executing Cybersecurity audit. Delivery will be by presentation, group syndicate exercises, training e-manual and interactive seminars, video presentations and active use of software, as well as group discussion on the results of the exercises. The delegates will also use free software for risk management as well as for auditing.