CyberSafety_TopLogo
Protect
your business
today with
cyber safety
e-learning.
CyberSafety_Mobile
protect your
business with

cyber safety
e-learning.
AT A
GLANCE

INSTANTLY AVAILABLE E-LEARNING: Immediately develops cyber security capability.

NO LIMIT TO HOW MANY PEOPLE CAN BE TRAINED IN A DAY: Get it now, for everyone, fast!

COMPLETED IN 90 MINUTES: Improves your protection with minimal time investment.

INTERACTIVE PHISHING GAME: Tests readiness to defend real life cyber threats or attacks.

INTERVIEWS WITH CYBER-CRIME AND IT EXPERTS: Education on the impacts of cyber attack.

UPDATED CONTENT: As new threats become known updates are added.

CITY & GUILDS ACCREDITED: Globally recognised accreditation at Pass, Merit and Distinction level.

cit-guild-ataglance-icon
REQUEST A
DEMO

Enter your details below and a member of our team will contact you to arrange a demo of the Cyber Safety course.

OR
CALL TO DISCUSS YOUR NEEDS ON
+44 1324 879135
+44 1752 848725
 
AT A GLANCE

INSTANTLY AVAILABLE E-LEARNING
Immediately develops cyber security capability.

NO LIMIT ON HOW MANY PEOPLE CAN BE TRAINED IN A DAY
Get it now, for everyone, fast.

COMPLETED IN 90 MINUTES
Improves your protection with minimal time investment.

INTERACTIVE PHISHING GAME
Tests readiness to defend real life cyber threats and attacks.

INTERVIEWS WITH CYBER-CRIME AND IT EXPERTS
Education on the impacts of cyber-attack.

UPDATED CONTENT
As new threats become known updates are added.

CITY & GUILDS ACCREDITED
Globally recognised accreditation at Pass, Merit and Distinction level.

cit-guild-ataglance-icon
REQUEST A
DEMO

Enter your details below and a member of our team will contact you to arrange a demo of the Cyber Safety course.

OR
Why you must
train your
people in
cyber safety
immediately
One third of all crime committed in the UK today is considered to be cyber-crime.
Every business using computers to handle data faces a major security threat from cyber criminals.
Every day your organisation is vulnerable to attack from phishing emails and social engineering.
Protective software like antivirus, firewalls or ‘patches’ only defend against threats which are already known. New cyber threats are emerging all the time.
Technology fixes will not protect your business if an employee opens the door to cyber criminals.
The most sustainable way to protect your business against all cyber threats is by training your people to understand those threats and risks and adopt a cyber-secure mind set.
PROTECT YOUR BUSINESS TODAY AND EVERYDAY – GET YOUR PEOPLE TRAINED NOW.
Why you must train your people in cyber safety immediately

One third of all crime committed in the UK today is considered to be cyber-crime.

Every business using computers to handle data faces a major security threat from cyber criminals.

Everyday your organisation is vulnerable to attack from phishing emails and social engineering.

Protective software like antivirus, firewalls or ‘patches’ only defend against threats which are already known. New cyber threats are emerging all the time.

Technology fixes will not protect your business if an employee opens the door to cyber criminals.

The most sustainable way to protect your business against all cyber threats is by training your people to understand those threats and risks and adopt a cyber-secure mind set.

PROTECT YOUR BUSINESS TODAY AND EVERYDAY – GET YOUR PEOPLE TRAINED NOW.
COURSE
Content
Duration: 90 minutes
1
icon-people
People

This raises awareness of the many different types of threats which exist, shows how to spot these and informs participants of the damage they can do.

1
icon-process
Process
This section provides your organisation with ten simple golden rules of cyber security. Following these rules can dramatically cut your organisation’s risk and vulnerability to a cyber-attack.
COURSE CONTENT
Duration: 90 minutes
1
icon-people
People
This raises awareness of the many different types of threats which exist, shows how to spot these and informs participants of the damage they can do.
1
icon-process
Process
This section provides your organisation with ten simple golden rules of cyber security. Following these rules can dramatically cut your organisation’s risk and vulnerability to a cyber-attack.
0
icon-technology
Technology
Here participants learn about firewalls, antivirus and safe downloading. This crucial section educates learners on the benefits and limitations of technology and trains them to use available technology safely.
0
icon-documentary
Documentary
In this section ‘white hat’ hackers and a selection of the Apex team are interviewed to discuss live examples of every day steps that need to be taken to keep any organisation safe. The examples provided are very relatable to learners in your organisation.
0
icon-technology
Technology
Here participants learn about firewalls, antivirus and safe downloading. This crucial section educates learners on the benefits and limitations of technology and trains them to use available technology safely.
0
icon-documentary
Documentary
In this section ‘white hat’ hackers and a selection of the Apex team are interviewed to discuss live examples of every day steps that need to be taken to keep any organisation safe. The examples provided are very relatable to learners in your organisation.
0
icon-game
Phishing Game
An interactive game to test the participant’s ability to identify common signs of malicious or phishing emails.
0
icon-assessment
Course Assessment
A multiple-choice assessment – to pass participants must achieve a score of more than 80%. Participants are not shown the correct answers, therefore if they fail they must go to the beginning of the course and start again. This ensures your people really are fully equipped after they have passed the assessment.
0
icon-game
Phishing Game
An interactive game to test the participant’s ability to identify common signs of malicious or phishing emails.
0
icon-assessment
Assessment
A multiple-choice assessment – to pass participants must achieve a score of more than 80%. Participants are not shown the correct answers, therefore if they fail they must go to the beginning of the course and start again. This ensures your people really are fully equipped after they have passed the assessment.
THE THREE P’S
of Robust
Cyber
Safety
Policy and Process
Robust and effective company security policies and procedures which are executed consistently and with commitment from all employees. The British Standard ISO 27001 uses 142 separate information security controls and is an excellent example of how policy and process work to deliver a robust defence.
Product
Up to date and secure hardware and software. Old versions of software do not protect against the latest threats, some old hardware is easier to infiltrate. Best practice is to keep both hardware and software up to date.
People
Employees who are well trained in identifying cyber threats are the first line of defence in keeping your business secure.
THE 3 P’S
OF ROBUST
CYBER
SAFETY
People
Employees who are well trained in identifying cyber threats are the first line of defence in keeping your business secure.
Product
Up to date and secure hardware and software. Old versions of software do not protect against the latest threats, some old hardware is easier to infiltrate. Best practice is to keep both hardware and software up to date.
Policy and Process
Robust and effective company security policies and procedures which are executed consistently and with commitment from all employees. The British Standard ISO 27001 uses 142 separate information security controls and is an excellent example of how policy and process work to deliver a robust defence.
Have your team trained in 24 hours.
Request a demo now

Or
Call us to discuss
your needs on
+44 1324 879135
+44 1752 848725
© APEX TRAINING AND DEVELOPMENT LTD, 2017. ALL RIGHTS RESERVED.
Have your team trained inside 24 hours.
Request a demo now

Or
Call us to discuss
your needs on
+44 1324 879135
+44 1752 848725
© APEX TRAINING AND DEVELOPMENT LTD, 2017. ALL RIGHTS RESERVED.