Security in Depth
Security in Depth
  • Home
  • About
  • Services
  • CARR
  • Incident Response
  • Events
  • Login
  • Contact Us
  • Technical
  • Learning in Depth
  • Articles and Media
  • Privacy
  • Scams
  • Careers
  • Downloads
  • DMARC
  • Cyber Research
  • Seniors
  • AI and Cyber
  • Partners
  • ISO27001
  • Incident Management
  • Bookings
  • Cyber Training
  • ThreatIntel
  • CyberAssist
  • More
    • Home
    • About
    • Services
    • CARR
    • Incident Response
    • Events
    • Login
    • Contact Us
    • Technical
    • Learning in Depth
    • Articles and Media
    • Privacy
    • Scams
    • Careers
    • Downloads
    • DMARC
    • Cyber Research
    • Seniors
    • AI and Cyber
    • Partners
    • ISO27001
    • Incident Management
    • Bookings
    • Cyber Training
    • ThreatIntel
    • CyberAssist
  • Sign In
  • Create Account

  • Bookings
  • Orders
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • Orders
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • About
  • Services
  • CARR
  • Incident Response
  • Events
  • Login
  • Contact Us
  • Technical
  • Learning in Depth
  • Articles and Media
  • Privacy
  • Scams
  • Careers
  • Downloads
  • DMARC
  • Cyber Research
  • Seniors
  • AI and Cyber
  • Partners
  • ISO27001
  • Incident Management
  • Bookings
  • Cyber Training
  • ThreatIntel
  • CyberAssist

Account


  • Bookings
  • Orders
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • Orders
  • My Account

Upcoming Events - Webinars & Training

NEGOTIATING WITH HACKERS

EXECUTIVE TACTICS IN INCIDENT RESPONSE

Negotiating in high-stakes environments requires more than just  traditional negotiation skills. It demands an understanding of complex,  pressure-filled scenarios where every word counts. This course equips  you with the advanced strategies needed to excel in negotiations that go  beyond the boardroom – engaging with digitally savvy opponents in the  realms of cyber threats and beyond.

REGISTER NOW

ISO 27035 TRAINING COURSE

INCIDENT MANAGEMENT

ISO/IEC 27035 Foundation training enables you to learn the basic elements to implement an Incident Management Plan and manage Information Security Incidents. During this training course, you will be able to understand Information Security Incident Management processes. 

REGISTER NOW

Upcoming dates for ISO 27035 Training course

June 3-4

August 12-13

July 22-23

REGISTER NOW

July 22-23

August 12-13

July 22-23

REGISTER NOW

August 12-13

August 12-13

August 12-13

REGISTER NOW

Past Events

Cyber Awareness Training

How to respond to a cyber incident

Cyber Awareness Training

Duration: 1 hour.

Times conducted: 

Always 12-1pm Melbourne time

Cost: Free


Dates when this training will occur:

Tuesday 24th January 2023

Wednesday 15th February 2023

Wednesday 15th March 2023

Wednesday 5th April 2023

  

About the course:

This  cyber awareness training has been designed for all businesses and  individuals to use. It includes some straightforward practical steps  that will help your staff to protect both their personal information as  well as protect your business from unauthorised access to computers,  networks, and software. Cyber awareness training is a vital part of an organisation’s information security measures.


Who should attend:

Everyone, it’s important to ensure that all staff keep up to date with cyber security best practices.


What does the course cover:

The  course provides real life examples and demonstrations on how you can  better protect yourself and your business  by understanding:

  • Phishing.
  • Passwords & Authentication.
  • Handling data.
  • Staying safe online.
  • Reporting Cybercrime.
  • Malware & Whaling Attack.


Learning outcomes:

  • Understand what cyber security is and why it’s important
  • Know about the common cyberattacks that take place
  • Understand the impact that a cyber security breach can have on you and your organisation



Protecting your Identity

How to respond to a cyber incident

Cyber Awareness Training

Duration: 1 hour.

Times conducted: 

Always 12-1pm Melbourne time

Cost: Free


Dates when this training will occur:

Tuesday 31st January 2023

Tuesday March 7th 2023

Tuesday 9th May 2023

  



About the course:

Identity  theft can be both personally and professionally devastating. Whether  it’s the emptying of your bank account or access to confidential  information within your organisation, the threat posed by identity theft  is real. That’s why we built our Identity Theft course, to reduce your organisational risk to this growing crime.



Who should attend:

Everyone, it’s important to ensure that all staff keep up to date with cyber security best practices.


What does the course cover:

  • The difference between identity theft and identity fraud and why it can have serious, long-term effects for victims
  • Practical ways to safeguard your identity and the extra precautions you should take when moving home
  • Protective  measures that will keep your personal information private and how  technology can leave you vulnerable to identity theft
  • What to do if someone has stolen your identity
  • The most common means by which criminals commit identity theft


Learning outcomes:

  • Understand the key steps to protecting your online identity
  • Understand what you can do if your identity has been compromised
  • Understand the impact that identity theft can have on any individual

How to respond to a cyber incident

How to respond to a cyber incident

How to respond to a cyber incident

Duration: 1 hour.

Times conducted: 

Always 12-1pm Melbourne time

Cost: Free


Dates when this training will occur:

Wednesday 1st of February 2023

Wednesday 7th of March 2023

Wednesday 10th of May 2023

  



About the course:

The cyber incident response course is aimed at a wide audience including those, technical or non-technical, who want to understand how to respond to a cyber-attack. The course has no prerequisites and  students will understand the operational strategies and processes an  organisation needs to consider before, during and after a cyber crisis or data breach.


 

Who should attend:

Everyone, it’s important to ensure that all staff keep up to date with cyber security best practices.


What does the course cover:

  • The basic principles of incident response and business continuity;
  • Common cyber threats and their potential impact;
  • The role of the cyber incident response team; and
  • The three phases of the CREST incident response process.


Learning outcomes:

  • Understand the key steps to managing a cyber incident
  • Understand why a cyber incident is not simply a technical issue
  • Understand the ongoing impacts and requirements of managing different cyber events








Copyright © 2024 Security in Depth - All Rights Reserved.

  • Services
  • Shop
  • Contact Us
  • Learning in Depth
  • Articles and Media
  • Privacy
  • Virtual CISO
  • Legal
  • Scams
  • CARR -What to expect
  • bogus logins
  • Bookings
  • Data Recording Policy

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close