Outstanding Cyber Security Training/Awareness Initiative

NPCC National Cybercrime Programme

The NPCC Cybercrime Training Programme provides police forces in England and Wales with the skills needed to be able to respond to a report of cybercrime and fully investigate any criminal activity, prosecute offenders where necessary but also divert individuals on the cusp of criminal activity on to productive paths. The Programme gives staff the technical skill to advise and protect individuals and organisations in cyber security to help better protect themselves against cybercrime.

Course overview

The Protect & Prepare course is 5-days long and has been designed to give delegates the necessary skills to help organisations protect themselves against a cyber-attack. The course is based around the CompTIA Sec+ (601) accreditation, which is a well-respected industry qualification in cyber security.

The course is suitable for officers and staff who:

  • Have successfully completed the NPCC Cybercrime Computing and Networking Foundation Course
  • Know the function and basic features of the components of a PC
  • Use Windows to create and manage files and use basic administrative features
  • Operate the Linux OS using basic command-line tools.
  • Know basic network terminology and functions
  • Understand TCP/IP addressing and core protocols

Learning outcomes

This course will teach the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.

  • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
  • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security
  • Implement secure network architecture concepts and systems design
  • Install and configure identity and access services, as well as management controls
  • Implement and summarize risk management best practices and the business impact
  • Install and configure wireless security settings and implement public key infrastructure

Course modules

Module 1 – Threats, Attacks, and Vulnerabilities

  • Indicators of Compromise
    • Exercise - VM Orientation
  • Malware - Types
  • Critical Security Controls
    • Exercise - Using Vulnerability Assessment Tools
  • Security Posture Assessment Tools
    • Exercise - Using Network Scanning Tools 1
    • Exercise - Using Network Scanning Tools 2
    • Exercise – Using Steganography Tools
  • Incident Response

Module 2 – Identity and Access Management

  • Cryptography
    • Exercise - Implementing Public Key Infrastructure
    • Exercise - Deploying Certificates and Implementing Key Recovery
  • Identification and Authentication
    • Exercise - Using Password Cracking Tools
  • Identity and Access Services
  • Account Management
    • Exercise - Using Account Management Tools

Module 3 – Architecture and Design (1)

  • Secure Network Design
    • Exercise - Implementing a Secure Network Design
  • Firewalls and Load Balancers
    • Exercise - Implementing a Firewall
  • IDS and SIEM
    • Exercise - Using an Intrusion Detection System
  • Secure Wireless Access
  • Physical Security Controls

Module 4 – Architecture and Design (2)

  • Secure Protocols and Services
    • Exercise - Implementing Secure Network Addressing Services
    • Exercise - Configuring a Secure Email Service
  • Secure Remote Access
    • Exercise - Implementing a Virtual Private Network
  • Secure Systems Design
  • Secure Mobile Device Services
  • Secure Virtualization and Cloud Services

Module 5 – Risk Management

  • Forensics
    • Exercise - Using Forensic Tools
  • Disaster Recovery and Resiliency
  • Risk Management
  • Secure Application Development
    • Exercise - Identifying a Man-in-the-Browser Attack
  • Organisational Security

Exam details

End of Course Exam

  • Online proctored exam taken post course
  • Duration - 90 minutes
  • Questions 90, multiple choice
  • Passing score of 750 out of 900 possible points
How to book