Cyber risk is now firmly at the top of the international agenda as high-profile breaches raise fears that hack attacks and other security failures could endanger the global economy.

The Global Risks 2015 report, published in January by the World Economic Forum (WEF), included this rather stark warning: “90 percent of companies worldwide recognize they are insufficiently prepared to protect themselves against [cyber attacks].”

This Introduction to Cyber Security course is designed to give delegates a baseline understanding of the area of Cyber Security Management including those who have information security responsibilities as part of their day to day role, or who are thinking of moving into information security or related function.


The objectives of this course are to enable candidates to demonstrate knowledge and understanding of Information Security Management Principles and techniques. Key areas are:

  • Knowledge of the concepts relating to information security management (Confidentiality, Integrity, and Availability).
  • Understanding of current national legislation and regulations which impact upon information security management.
  • Awareness of current national and international standards, frameworks and organizations which facilitate the management of information security.
  • Understanding the current business and common technical environments in which information security management has to operate.
  • Knowledge of the categorization, operation, and effectiveness of controls of different types and characteristics.


The programme is designed for:

Members of cyber security management teams, IT Managers, security and systems managers, Information asset owners and employees with legal compliance responsibilities.


The benefits of this course are therefore highly significant for businesses in order to make employees aware of the types of security required, how easy it is to inadvertently become a risk and the penalties resulting from breaches.


Day One:

Session 1: Cyber Security Principles – Delegates will learn the basic concepts of information security together with the main terms in common usage and will be introduced to topics such as confidentiality, integrity, availability, and non-repudiation.

Session 2: Introduction to Cyber Security Risk – Delegates will look at the following areas – threats, vulnerabilities, impact, and risk.

Session 3: Procedural & People Security Controls – In this section, delegates will learn about the risks to information security involving people and will gain an understanding of the controls that may be used to manage those risks and an appreciation of the importance of appropriate training for all those involved with information.

Session 4: Cyber Security Case Studies – In this session, delegates will be taken through several recent real-life cyber security case studies in a step by step process to identify lessons identified and lessons learned.


Day Two: 

Session 1: Introduction to TOR – Delegates will be given an introduction to The Onion Router and how it is installed / how to navigate around it safely and securely. 

Session 2: Introduction to Deepweb & Darkweb – This is a hands-on session where delegates will be shown how to operate within the Deepweb in a safe and secure manner. Delegates will also be introduced to the Darkweb so that they be aware of the risks that surround its use.

Session 3: Technical Security Controls – In this section, delegates will learn about the technical controls that can be used to help ensure effective information security. This will include the following topics.

  • Learning about the threats from malware.
  • Gain an understanding of the impact of those threats on networks and other communications systems.
  • Learn about the different approaches to information security required when dealing with out-sourced or other external facilities providers.
  • Learn about the importance of effective information security in all networked environments where there is information storage, processing or access being provided.

 Session 4: Software Development Lifecycle – In this session, delegates will learn about the risk of security brought about by the development and full lifecycle of software. 


Day Three:

Session 1: Physical and Environmental Controls – In this session, delegates will gain an understanding of the physical aspects of security available in multi-layered defences.

 Session 2: Introduction to Digital Forensics – In this session, delegates will gain an understanding of the important aspects of incident investigation and how the forensic evidence may be preserved.

Session 3: Introduction to Cryptography  – In this session, delegates will be introduced to basic cryptographic theory, techniques and algorithm types, their use in confidentiality and integrity mechanisms and common cryptographic standards.

Session 4: Disaster Recovery and Business Continuity Management – In this session, candidates will learn about the differences between and the need for business continuity and disaster recovery.


Date: 4th – 11th May 2019

Location: Four Points by Sheraton Plot 9/10 Block 2, Oniru Chieftaincy Estate, Victoria-Island Lagos.

Course Fees: TBA

10% Early Bird Discount:
For companies that register 3 or more participants and individuals who register before 18th April 2019.

Training Provider: GUS Consulting Ltd. in partnership with Jasper International Academy


Course Facilitator

This course will be delivered by Anthony Daly,  a successful Security Specialist with extensive experience in Intelligence, Information Security and Assurance.

Anthony has held an Enhanced security clearance (DV) for over 16 years. He is an active member of the Maritime Reserves.


How to Enroll

Contact us:

Phone: 01-4540261, 09091214544


or simply complete the online registration form by clicking here.

Share This

© 2018: GUS Consulting Ltd, All Rights Reserved | D5 Business Line Theme by: D5 Creation | Powered by: WordPress