Skip to Main Content
Strengthen your email security practices with 50% off e-learning | Shop now
Cyber Incident Response Management Foundation Training Course

Cyber Incident Response Management Foundation Training Course

SKU: 4854
  • Covers all aspects of cyber security at a foundation level, from what cyber security is, to useful security standards and frameworks.
  • Topics include the threat landscape, phishing, device security and cyber incident response management.
  • Learn at your own pace via our user-friendly LMS (learning management system).
  • Successful completion of the course and included exam leads to the Certified Cyber Security Foundation (C CS F) qualification and 7CPD/CPE points.
Step 1 - Select location
Step 2 - Select date
Price: 570,00 €
Step 3 - Select quantity
Description

Cyber Incident Response Management Foundation training course outline

  • Understand key definitions and legal requirements that underpin incident response.
  • Identify the components of the cyber kill chain, recognise common cyber threats and understand common threat actors.
  • Define the structure, role and responsibilities of the incident response team.
  • Comprehend the seven stages of incident response. 
  • Propose the steps to formulate and test an incident response plan and define the scope of a business impact analysis.
  • Apply incident response techniques to common risk scenarios.
  • Know the role of cyber resilience in supporting incident response management.
  • Manage communications and reporting requirements under the General Data Protection Regulation (GDPR) and the Directive on security of network and information systems (NIS Directive).

Cyber Incident Response Management Foundation Training Course benefits

 Designed by experts

We’re acknowledged leaders in cyber and information security with years of practical, hands-on experience.

 Delivered by professionals

Taught by a real-world practitioner with extensive experience of delivering effective cyber security programmes to organisations worldwide.

 Gain practical experience

Use tools and real-life examples to understand how to plan and implement incident response techniques.

 Hands-on study

Participate in group discussions and practical exercises, and explore case studies throughout the course.

 Learn from anywhere

Choose whether you attend Live Online or in person in-house.


Who should attend this course?

Managers who are already involved in incident management with either an information security or data protection background. Individuals with little experience who are keen to enter the field or broaden their knowledge of incident management with a professional qualification:

  • Business managers
  • Compliance managers
  • IT managers
  • Helpdesk managers
  • Project managers
  • Risk managers
  • Information security managers
  • ISO 27001 lead auditors
  • PCI QSAs

Your learning path

Find out how the Cyber Incident Response Management Foundation Training Course will help you start or enhance your knowledge and career.

This course is an essential component of the following learning paths:

Image containing Cyber Security Learning Path

Why choose IT Governance for your training needs?

  • We’re internationally recognised as the authority on ISO 27001 – Our team led the world’s first ISO 27001 certification project, and since then we have trained more than 8,000 professionals on information security management system (ISMS) implementations and audits.
  • Trained by industry experts – our trainers are working consultants with years of practical, hands-on experience.
  • Choose the method that suits you – we offer classroom, Live Online, distance learning, e-learning and in-house training options.
  • Access your training anywhere – all our course materials are provided as a digital copy, allowing you to access them anywhere and at any time. Documents will be made available 20 days before your course.
  • Business solutions to suit you – whether you’re a multinational wanting us to manage all your training needs or a small business wishing to boost your workforce skills, we offer a range of training solutions.
Course details

What does thisn training course cover?

  • What cyber security/information security is
  • The threat landscape
  • Legal, regulatory and contractual obligations
  • Threat intelligence
  • Malware
  • Humans and social engineering
  • Phishing
  • Password security
  • Mobile device security
  • Web application security
  • Social media security
  • Remote working – covering travel and home working
  • An introduction to risk management
  • Security standards and frameworks
  • Security in the Cloud (ISO 27018)
  • Incident response
  • Business continuity
  • Supply chain security

What’s included in this course?

  • A professional training venue with lunch and refreshments.
  • Full course materials (digital copy provided as a PDF file).
  • The Incident Response Management exam.
  • A certificate of attendance.

What equipment should I bring?

The exam is an online exam. You will need to bring a ‘pop-up enabled’ laptop/tablet to the venue. Full details on how to access the exam will be provided by email 1–2 days before sitting the exam


Course duration and times

Day 1: 9:00 am – 5.00 pm


CPD/CPE points

This course is equivalent to 7 CPD/CPE points.

Exams and qualifications

Cyber incident Response Management exam

Attendees take the ISO 17024-certificated CIRM F exam set by IBITGQ
(International Board for IT Governance Qualifications). There is no extra charge for this exam.

  • Delivery method: Online
  • Duration: 60 minutes
  • Questions: 40
  • Format: Multiple choice
  • Pass mark: 65%

This course is equivalent to:

7

CPD points


What qualifications will I receive?

Cyber Incident Response Management (CIRM F).


Accreditation

This course holds accreditation from IBITGQ (International Board for IT Governance Qualifications), a renowned authority in personnel certification within the field of IT governance.

As a premier personnel certification body, IBITGQ specialises in certifying individuals who demonstrate exceptional proficiency in IT governance practices.

IBITGQ maintains accreditation to the ISO/IEC 17024:2012 standard, a globally recognised benchmark for conformity assessment. Accreditation by the International Accreditation Service (IAS) further underscores the course's commitment to meeting stringent certification requirements.

ISO 17024 certification is esteemed within the industry and universally acknowledged by employers worldwide. By aligning with this standard, our course ensures that your qualifications are not only recognised but also highly valued by employers across diverse sectors.

Upon successful completion of the course, you have the opportunity to validate your professional expertise by registering your qualification on the esteemed IBITGQ/GASQ successful candidate register. This platform serves as a testament to your commitment to excellence in IT governance, setting you apart as a distinguished professional in the field.


Do I need to bring proof of identity?

Delegates must bring a form of photographic ID with them as the invigilator my request to check it prior to the exam.


How will I receive my exam results and certificates?

  • Provisional exam results will be available immediately on completion of the exam. Confirmed exam results will be issued within ten working days from the date of the exam.
  • Certificates for those who have achieved a passing grade will be issued within ten working days from the date of the exam.
  • Results notifications and certificates are sent directly to candidates by the relevant exam board in electronic format; please note that hard copy exam certificates are not issued.

Can exams be retaken?

Yes, if you are unsuccessful on the first attempt you can retake the exam for an additional fee. You can email us to schedule the retest for the exam.

Prerequisites

Are there any prerequisites for this course?

There are no formal entry requirements but this is a professional course. It is assumed that attendees will have a good general understanding of cyber security principles and controls that underpin the protection of confidentiality, integrity and availability of data, gained through practical experience or reading


Is there any recommended reading?

We would recommended purchasing one or more of the following:

Customer Reviews

top
Loading...