Overview
This course provides an essential introduction to cyber security, equipping participants with the knowledge and awareness required to protect themselves and their organisations against cyber threats. Learners will examine who cyber attackers are, the techniques they use, and the motivations behind their actions. Using real-world examples and practical exercises, this course helps attendees understand the risks and how to take proactive steps to mitigate them. Participants will gain a foundational understanding of security frameworks, threat classification, and best practices in cyber hygiene.
Prerequisites
Participants do not need prior technical expertise, but a general awareness of IT systems and a willingness to engage in interactive exercises will be beneficial. This course is suitable for professionals across all departments, especially those in information-sensitive roles.
Target audience
This course is ideal for:
- Non-technical professionals seeking foundational cyber security awareness
- Managers and team leaders responsible for data protection
- New entrants to cyber security roles
- Individuals interested in learning how to protect themselves online and in the workplace
Learning Outcomes
By the end of this course, learners will be able to:
- Understand why cyber security is relevant to personal and organisational risk
- Describe the motivations and tactics of hackers
- Identify and explain the stages of a cyber attack, including footprinting, social engineering, and network scanning
- Define common types of malware and their impact
- Describe how organisations respond to and recover from attacks
- Apply recommended practices to reduce cyber risks
- Locate trusted sources for ongoing support and threat intelligence
Course Outline
Introduction to cyber and information security
- The CIA triad: confidentiality, integrity, availability
- Building a basic information security management system (ISMS)
- Understanding how organisational culture and policy play a role in security
The threat landscape
- Types of cyber attackers: hacktivists, cybercriminals, state actors, insiders
- Motivation behind attacks: profit, protest, disruption
- Trends in threat activity and how organisations are being targeted
Understanding a cyber attack
- The anatomy of an attack: reconnaissance, access, execution
- Techniques used by attackers: footprinting, social engineering, port scanning, network sniffing
- Real-life case studies to illustrate attacker methodologies
Practical defence: tips and advice
- Securing your access: passwords, multi-factor authentication
- System protection: anti-virus, endpoint security, software patching
- Data protection: backup strategies, encryption basics
- What to do in case of an attack: incident response, recovery actions, who to contact
Exams and assessments
There are no formal exams or assessments for this course. Learning is reinforced through discussion, live demonstrations, and interactive practical activities throughout the two days.
Hands-on learning
This course integrates practical exercises at every stage to reinforce learning outcomes. Activities include simulated attack walkthroughs, interactive quizzes, and hands-on practice with basic security settings. Scenarios will help learners identify threats and apply protective measures in real time.

Frequently asked questions
How can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.