Skip to main content
Cyber Security for Managers

Course details

Code
O19C709N1Y
Fees
£470.00

Date
Fri 20 Mar 2020
Time
9:00am-5:00pm

Cyber Security for Managers

Overview

This course will introduce concepts and techniques relevant for managing people and data in the modern, connected business environment. 

The day will be a mix of lecture, peer-to-peer learning, and computer-based exercises, including live scenario simulations to help you gain a better understanding of the strengths and weaknesses of different approaches to cyber security.

This course can be taken separately or as part of Tech for Managers: Discount Registration

Programme details

Content

  • Terminology
  • Risk modelling: what do you care about?
  • How to parse sales pitches and buy what you need
  • What do your employees need from you?
  • What to prepare, for when things go wrong
  • Compliance: GDPR, legal requirements, insurance
  • Managing people: social media, bring-your-own-device, insider threat

Audience

This course is for people who are able to make (or influence) strategic decisions for an organisation: your job might depend on having functioning technology, or involve understanding cyber risk to your organisation, or managing people in tech-enabled environments.  

The course will be a mix of concepts and hands-on practice: we will not teach you how to be IT professionals, but we will help you think about how to understand risk, what kinds of questions to ask, and how to recognise good answers.

Certification

Participants who attend the full course will receive a University of Oxford certificate of attendance. This will be presented to you prior to the end of the course wherever possible.

The certificate will show your name, the course title and the dates of the course you attended.

Fees

Description Costs
Course fee £470.00

Payment

Fees include course materials, tuition, refreshments and lunches. The price does not include accommodation.

All courses are VAT exempt.

Register immediately online 

Click the “book now” button on this webpage. Payment by credit or debit card is required.

Request an invoice

Send a completed application form to the course administrator by email or post. Please do not send card details via email.

Tutors

Katherine Fletcher

Coordinator of Cyber Security Oxford and Project Manager for the Lloyd’s Register Foundation Foresight Review on Operational Cyber Security for the Industrial Internet of Things.  Katherine has a background in project management, risk management and compliance: she is an expert in translating cutting-edge cyber security research into real-world administrative and operational environments.  In addition to work at Oxford, she is Vice President of a medium-sized HVAC wholesaler in the USA and a freelance cyber security analyst.

Alastair Janse van Rensburg

Alastair is currently a Research Associate with the Department of Computer Science and a lecturer at St Catherine's College, Oxford. His DPhil research in cybersecurity focused on modelling network security through attack graphs, and he now looks at modelling and estimation of cyber risk for organisations. Alastair was a co-founder and president of Oxford's Competitive Computer Security Society and ran events, helping participants from a broad range of backgrounds and skillsets get hands-on experience with technical concepts in security.

Richard Baker

Richard is a Postdoctoral Research Associate in the Department of Computer Science, specialising in systems security. His primary research area is physical-layer security in cyber-physical systems and wireless communication; with work on drone detection, malicious network detection and securing electric-vehicle charging. He was previously a software development consultant in the finance industry. He was a co-founder of Oxford’s Competitive Computer Security Society; promoting practical cybersecurity skills through team-based hacking competitions. 

Course aims

By the end of this course, you should be able to:

  • Understand common jargon in this field: terms like https, PGP, worm, Trojan, APT, SOC, CERT, LTS, S3 bucket, ransomware, BYOD…
  • Have a fundamental grasp of the most common cyber security threats and types of risk to organisations, and realistic approaches to dealing with them (often a mix of technical solutions, HR training/culture, and internal and external expertise)
  • Develop contingency plans for your organisation, including ideas of what safeguards to put in place now, and how to respond if things go wrong.  What can you do for yourself, and when and how do you call in experts?
  • Understand fundamental compliance concepts in relation to cyber security, including GDPR and insurance.
  • Understand and apply some strategies for managing people and systems in tech-rich environments.
  • Find further resources to help you keep learning and stay abreast of trends in the field.

You will also gain experience through hands-on exercises including:

  • Ransomware and how it moves through accounts within a system
  • Credential-reuse attacks and how fuzzing works
  • Simulating the reporting of a GDPR breach
  • Working on a mock-up IT system which has been compromised

Application

If you would like to discuss your application or any part of the application process before applying, please click Contact Us at the top of this page.

Accommodation

Although not included in the course fee, accommodation may be available at our on-site Rewley House Residential Centre. All bedrooms are en suite and decorated to a high standard, and come with tea- and coffee-making facilities, free Wi-Fi access and Freeview TV. Guests can take advantage of the excellent dining facilities and common room bar, where they may relax and network with others on the programme.

To check prices, availability and to book rooms please visit the Rewley House Residential Centre website.