Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Digital, Data and Technology Profession, Skills and Capability

Digital, Data and Technology Profession, Skills and Capability

The Scottish Digital Academy was launched in 2017 to provide high quality professional learning and training to support the development of digital skills and capability across the public and third sectors in Scotland.

Related resources

Cyber Resilience Strategy 2015-2020: Progress Report

This report entitled ‘Firm foundations’ highlights the progress of ‘Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland’ (2015-2020).

Read more Cyber Resilience Strategy 2015-2020: Progress Report in modal dialog

Training for Small Organisations and Charities

The training demonstrates how you can improve your organisation’s resilience, and covers five key areas. You’ll explore each of these topics by navigating several encounters a small business owner may have with cyber security over the course of a week, […]

Read more Training for Small Organisations and Charities in modal dialog

Cyber Security Learning Opportunities

Thinking about starting a career in cyber security but not sure where to begin? There are many free challenges and competitions you can take part in which will give you an idea of the kind of skills required

Read more Cyber Security Learning Opportunities in modal dialog

Guide to Phishing, Smishing and Vishing Scams

This guide explains how scammers use email, texts, and phone calls to steal personal or financial information. It highlights common tactics, warning signs and practical steps to protect yourself, helping readers recognise and respond to these everyday cyber threats.

Read more Guide to Phishing, Smishing and Vishing Scams in modal dialog

Incident Management

The NCSC defines a cyber security incident as: A breach of a system’s security policy in order to affect its integrity or availability The unauthorised access or attempted access to a system Cyber incidents can take many forms, such as […]

Read more Incident Management in modal dialog
Back to top of the page