Free Online

PA Consulting Courses

Show filters

Level

Duration

Subject

Language

Cyber Crime Investigation

Cyber Crime Investigation

0

Learn how to prevent cyber crimeAs we embrace rapidly evolving technology, the risk of people finding opportunities to exploit it continues to increase.This four-week course will equip you with the core technical and theoretical knowledge required to conduct cyber investigations and help prevent cyber crime in the future.Explore the challenges associated with a cyber crime investigatorYou’ll gain an insight into the legislation and best practices of how to prevent cyber crime, as well as the challenges which can arise during an investigation.You’ll also learn about data storage and how data is interpreted, managed, communicated, and potentially recovered from a hacked digital device.Discover how the data results gathered can help in reporting cyber crimeExploring virtual and volatile data, you’ll discover how gathering this data can help in the result of an investigation.This understanding will enable you to recognise the fundamental elements of what it takes to become an effective cyber investigator.Learn from the best minds in cyber investigationThe course is led by Paul Cain, a leading practitioner with almost 20 years of experience working in digital forensics and cyber investigations.You’ll learn from his expertise in both law enforcement and the private sector to help you develop cyber crime investigation skills.This course is designed for anyone interested in exploring the fundamentals of digital investigations and cyber crime.No hardware, software or other resources required to complete this course.

FutureLearn
4 weeks long, 3 hours a week
selfpaced
view all
Cyber Security Incident Response for Managers

Cyber Security Incident Response for Managers

0

Learn how to counteract cyber security threats within your businessOne of the highest threats an organisation can face is a cyber security incident. As well as the direct damage caused by a hacker or malicious software, businesses may face severe criticism or sanctions from regulatory bodies and serious reputational damage as a result.This practical, three-week course will introduce you to the potential cyber security threats you could face and will help you to identify incident frameworks to use to counteract these threats.Discover the types of cyber threats your organisation may encounterYou’ll explore the kinds of cyber threats that businesses and organisations may face, such as computer viruses, data breaches, and Denial of Service (DoS) attacks.These are threats that ultimately seek to damage data, steal data, or disrupt digital life in general.You’ll then gain an insight into how to report these incidents, and to whom, including appropriate legal and regulatory authorities.Identify cyber security incident response frameworksYou’ll explore a wide array of cyber security incident frameworks used to help reduce the harm and impact caused by incidents, and to deter future attacks.You’ll also gain an understanding of the legal and regulatory implications of a cyber security incident response.Learn from a cyber security expert at PA ConsultingThroughout the course, you’ll be under the guidance of Jim Metcalfe, a cyber security incident responder at PA Consulting who has assisted many organisations on their response to cyber security incidents.This course is designed for anyone interested in cyber security.You may be at the start of your career or already in a role that requires an understanding of the cyber security incident response process.

FutureLearn
3 weeks long, 3 hours a week
selfpaced
view all
Practical: Cyber Investigator

Practical: Cyber Investigator

0

Put what you have learned into practice to develop your digital forensics skillsAlmost every investigation: criminal, civil, corporate, HR, or security will include a digital element. It is vital that the investigator can correctly interpret and present the complex digital evidence so that it can withstand scrutiny – it may be the key that proves or disproves an investigation.Once you have completed the courses on the Digital Forensics and Incident Response (DFIR) Expert Track, this four-week practical course will help you gain hands-on experience in using digital evidence.You’ll learn how to put the five-phase investigation model into practice, with a focus on the identification and preservation of digital evidence.Learn how to carry out data interpretationThe course will help you develop an understanding of the requirements for a digital investigation.You’ll explore different scenarios to learn how to examine, recover, extract, and interpret data. This understanding will help you collect data in a forensically sound manner, translate raw data from sources that are compressed, encoded, or encrypted, and provide investigational context to the data.You’ll also learn how to present your interpreted data in a way that can be understood by others.Learn practical skills for dealing with digital evidence alongside PA ConsultingBy the end of the course, you’ll be able to explain the importance of evidential and forensic integrity. You’ll know how data can be hidden from the investigator and be able to present complex digital matters that can withstand scrutiny.Learning from Jim Metcalfe, a digital forensic investigator, cyber security incident responder, and expert witness at PA Consulting, you’ll finish the course with practical knowledge on how to handle digital evidence required for legal or disciplinary proceedings.This course is designed for anyone who has completed the Digital Forensics and Incident Response (DFIR) Expert Track.It will help you gain practical experience in digital investigation and forensics.

FutureLearn
3 weeks long, 3 hours a week
selfpaced
view all
ISO 27001: ISO Implementation Practitioner

ISO 27001: ISO Implementation Practitioner

0

Receive expert training in how to manage information security risksInformation is a crucial part of any modern business strategy. Collecting, and utilising information can be key to good organisational decision-making.However, with the increased use of information comes a need to ensure that information is kept securely.Information breaches can lead to loss of consumer trust and even financial penalties. As a result, systematic management of information security is vital.Learn how to implement ISO 27001 in your organisationISO 27001 is the international standard for Information Security Management Systems (ISMS), outlining how security risks can be assessed and managed.On this course, you’ll learn what ISO 27001 involves and why an organisation might choose to implement it. Risk management experts at PA Consulting will show you how to identify and manage potential information security risks, and develop a best-in-class Information Security Management System for your organisation.Master ISO 27001You’ll come away with key skills in ISO 27001, able to act as a practitioner in implementing information security management, ensuring your organisation is ISO 27001 compliant.This course would benefit information security students, information security professionals, CISOs, Data Protection Officers, IT auditors, Information risk professionals, and risk managers.

FutureLearn
3 weeks long, 4 hours a week
selfpaced
view all
Introduction to Digital Forensics: Malware Analysis and Investigations

Introduction to Digital Forensics: Malware Analysis and Investigations

0

Discover the fundamentals of malwareMalware can cause serious issues for businesses worldwide, and attacks are prevalent. Almost 10 billion malware attacks are estimated to have taken place in 2019 alone.On this three-week course, you’ll learn the essentials of what malware is, how it works, and how malware is used to extract personal data for private gain.Discover how malicious software infects your computerMalware is ‘malicious software’ designed to harm or exploit any programmable device, service, or network.You’ll learn how to identify malware on a computer system, as well as the different types of malware. With this understanding, you’ll know how to spot a potential attack, protecting your data and devices.Explore why malware analysis is importantYou’ll examine different malware categories and analyse how these categories are similar and how they differ.This will help you grasp how Windows 10 stores information about programs being executed, and how the New Technology File System stores metadata.With this knowledge, you’ll be able to communicate the importance of malware analysis to help protect your organisation.Examine virus and malware removal with industry leadersYou’ll discover the best practice for virus and malware removal to help you reduce the harm from an attack, should one occur.Learning from PA Consulting’s Steve Shepherd – an international expert in digital forensics and cybercrime – you’ll discover the history of malware, and learn key cyber skills that are in demand today.This course is designed for anyone interested in learning more about malware.You could be an IT student, digital forensic analyst, cyber incident responder, or IT security officer looking to enhance your digital forensic skills.No specific computer type is needed to complete this course, however, a Windows Operating System would be beneficial if you wish to identify operating system and file system artifacts on your own computer.

FutureLearn
3 weeks long, 3 hours a week
selfpaced
view all
Practical: Malware Analysis and Investigations

Practical: Malware Analysis and Investigations

0

Apply investigative methodology to malwareThis five-week course will help you put your knowledge from the Digital Forensics and Incident Response (DFIR) Expert Track into practice.You’ll learn to use investigation methodology in the context of malware to understand the practical steps to take to prevent a malware attack.By exploring different analysis environments, you’ll learn how to set up the right kind of environment in order to extract the most information about the malicious software.Learn how to detect network connections and collect network trafficMalware is typically delivered over a network, so an understanding of network connections is vital in helping you prevent an attack.You’ll explore practical methods to find malware connectivity, as well as the importance of collecting network traffic – the amount of data moving across a computer network.Explore volatile vs static analysisYou’ll identify different types of malware analysis, such as volatile and static, to further your understanding of malware and the impact it can have on a system.You’ll learn how to find suspect processes and files, and how to discover malware persistence mechanisms to help you remove malware as quickly and effectively as possible, should an attack occur.By the end of the course, you’ll feel confident in applying your knowledge to practical situations to further your skills as a digital forensic investigator or cyber security incident responder.This course is designed for anyone who has completed the Digital Forensics and Incident Response (DFIR) Expert Track.It will help you gain an understanding of malware analysis to help protect your organisation from an attack.

FutureLearn
5 weeks long, 3 hours a week
selfpaced
view all
Digital Forensics and Incident Response (DFIR): An Introduction

Digital Forensics and Incident Response (DFIR): An Introduction

0

Learn from the DFIR experts at PA ConsultingStart your cyber security career as you discover how performing digital forensics and incident response is vital for any business.

FutureLearn
18 weeks long, 3 hours worth of material
view all
Load more

Level

Duration

Language