Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Executive Education Training: Cyber Security

Executive Education Training: Cyber Security

This programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic.

Course content includes lectures and highly interactive discussions, as well as case studies related to:

  • Overall cybersecurity awareness
  • The role of non-tech leaders in cyber security management
  • Actionable ideas to increase cyber resilience
  • How to measure the organisation’s cyber-safety level—and how it is changing over time
  • How to speak the language of cyber security to enable informed conversations with your technology teams and colleagues, and ensure your organisation is as cyber secure as possible

Related resources

Passwords & Two-Step Verification

This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]

Read more Passwords & Two-Step Verification in modal dialog

Online Safety and Security Badges

SSSC have created 8 Online Safety and Security Open Badges, which are aimed at assisting people with staying safe and secure online. Open Badges are digital records of achievements and skills that are tied to assessment and evidence. Unlike paper certificates, Open Badges are manageable online.

Read more Online Safety and Security Badges in modal dialog

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog
Back to top of the page