UK-NCSC Certified CIPR course is a comprehensive guide for enabling organisations and individuals to prepare a well-defined and managed approach to dealing with a data breach or a cyberattack. This course is targeted at a non-technical audience comprising key decision-makers and managers in both managerial and technical profiles.
Benefits of choosing the E-Learning Option
- Full access to all content (downloadable PDFs) for 60 calendar days
- You can complete it as and when it’s possible, around your working hours or during.
- You still get access to regular live-discussions with global experts
- You are able to relate it to your business more as you have longer to complete (and consume) the training rather than it being a 1-day virtual event.
If you would prefer to attend a virtual class AND have the E-Learning included, you can select that option here once you have selected a date.
Highlights of the E-Learning CIPR course:
- Certified by the UK-Government's National Cyber Security Centre (NCSC).
- Accredited by the Chartered Institute of Information Security (CIISec).
- 19 modules with over 20 interactive exercises on all aspects of planning and response.
- Bonus content (worksheets, templates, how-tos, mind-maps) Content updated regularly
- 170 page, comprehensive supporting PDF book.
- Optional Exam: Take the APMG Examination of the NCSC-Certified Training (please note you must complete the course and obtain a certificate of completion before sitting for the exam)
Key Learning Objectives:
- Gain deeper insights on key risk-reducing controls to increase your company’s ability to protect, detect and respond to cyber-attacks on a strategic and operational level.
- Learn to design an early warning system to lower discovery time from months to days.
- Develop the skills to understand and improve your company’s cyber- resiliency by making more cost-effective, risk-based decisions.
- The latest techniques and insights on incident response.
- Threat Intelligence-led testing and response framework adopted by leading governments and institutions.
- How to use threat intelligence to lower organisation risk and speed up response times.
- The Cyber Kill Chain (the cyber attack process) and how to design an early warning system to lower discovery time from months to days.
- How to create actionable, fit-for-purpose plans, checklists and processes.
- How to define and baseline “Normal” within your organisation.
- Understand 'Normal' and how it can help reduce your time to respond and reduce human error.
- The best methods to stop up to 90% of all cyber attackers in their tracks, before they breach your critical data.
- How to design and implement a response framework and build an effective cyber response team.
- The “Golden Hour” and why it’s critical to managing an incident.
- The core concepts of incident triage, OODA and their relevance and importance in a cyber resilient organisation.
Furthermore, this cybersecurity training course provides senior management and incident response teams, amongst others, with the vital knowledge and skills to plan, lead and manage a cyber crisis and equips the learner with competence so that they can rapidly detect, rapidly respond and rapidly recover from a cyber-crisis.
Directly download the full Learning Objectives of the course here
Templates. Worksheets & Mind-maps
When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.
Continuing Professional Development
CPD points can be claimed for this course at the rate of 1 point per hour of training for this NCSC-certified and CIISec-approved course (8 points for one-day public course and 15 points for the two-day internal workshop - for when organisations host this course internally).
CIPR Student-Only Incident Response Plan Template
As a student you get access to unique content including our highly acclaimed Cyber Incident Response Plan Template. If you want, you can download the FREE version of the Incident Response Plan template here.
(ISC)2 & ISACA Members:
You can claim 8 CPE points after they complete the whole course and obtain the attendance certification.
Cyber Incident Response - Student Feedback & Testimonials
Unsolicited testimonials from participants from Microsoft, Adobe, UK Police Cyber Crime Teams, UBS Bank Switzerland and more.
Templates, Worksheets, & Checklists
When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.
The image on the left is a gallery view of some of the templates and collateral available to students.
Course Curriculum
- About this Module
- CIPR Online Module 2 Threat Actors (12:31)
- CIPR Online Module 2a The Privileged User (11:24)
- Module 2 Exercise 1
- Module 2 Exercise 2
- Module 2a Exercise 1
- Module 2a Exercise 2
- Module 2a Exercise 3
- Test your learning
- Additional Collateral: Workflow: Selecting Threat Actors
- Additional Collateral: Example: Threat Agent Library - Intel
- Additional Collateral: CIPR Privileged User Worksheet
- About this Module
- CIPR Online Module 4a Cyber-attack Process - Attack Methodology (15:21)
- CIPR Online Module 4b Cyber-attack Process - Tools _ Technology (7:43)
- CIPR Online Module 4c Cyber-attack Process - Case Studies (9:44)
- CIPR Online Module 4d Cyber-attack Process - Threat Intelligence (14:51)
- Module 4a Exercise 1
- Module 4b Exercise 1
- Module 4b Exercise 2
- Test your learning
- Case Study - SANS Analysis Ukraine Attack
- Case Study - Target Kill Chain Analysis
- Additional Collateral: Workflow: Sample Threat Intel from NCSC
- Additional Collateral: DNS Threat Intel from NCSC
- About this Module
- CIPR Online Module 6a Golden Hour _ Incident Management (25:58)
- CIPR Online Module 6b Managing an Incident (8:20)
- CIPR Online Module 6c Playbooks (9:24)
- CIPR Online Module 6d Creating and Incident Response Plan (8:40)
- Module 6a Exercise 1
- Module 6a Exercise 2
- Module 6d Exercise 1
- Module 6d IR Mindmap
- Test your learning
- Additional Collateral: Defining a Breach Module 6a
- Additional Collateral: Workflow: Creating an Incident Response Strategy
- Student Version - Cyber Incident Response Plan Template
- Course PDF CIPR Online Training - Module 1 - Cyber Resiliency
- Course PDF CIPR Online Training - Module 2 -Threat Actors
- Course PDF CIPR Online Training - Module 2a Privileged User
- Course PDF CIPR Online Training - Module 3 Define Normal
- Course PDF CIPR Online Training - Module 4a The Cyber-attack Process
- Course PDF CIPR Online Training - Module 4d The Cyber-attack Process
- Course PDF CIPR Online Training - Module 4b The Cyber-attack Process
- Course PDF CIPR Online Training - Module 5 Visibility
- Course PDF CIPR Online Training - Module 6a Golden Hour & Incident Management
- Course PDF CIPR Online Training - Module 6b Golden Hour & Incident Management
- Course PDF CIPR Online Training - Module 6c Golden Hour & Incident Management
- Course PDF CIPR Online Training - Module 6d Golden Hour & Incident Management
- Course PDF CIPR Online Training - Module 7 Building the Team
- Course PDF CIPR Online Training - Module 8 Forensics & Investigations
- Course PDF CIPR Online Training - Module 9 Regulations & Standards
- Course PDF CIPR Online Training - Module 10 The Technology Stack
- Course PDF CIPR Online Training - Module 11 Commmunications & PR in Incident Management
Online Examination with Digital Badge (optional)
Following the completion of the training course (Public, Internal, Instructor-led or Self Paced Learning) all students have the option of becoming certified in CIPR by successfully passing the APMG International examination of the NCSC-Certified Cyber Incident Planning and Response training. The exam is administered by APMG International and invigilated by ProctorU who provide secure live and automated online proctoring services for academic institutions and professional organisations.r
Digital badges are secure, digital representations of your professional development credentials. Embed your digital badge on an email signature, website, social media profile or a digital CV.
With just one click, employers, clients, customers and other interested parties can easily view and verify your credentials and skills.
Students who have passed come from organisations including Microsoft, Adobe, NHS, numerous Government departments and Police forces, Unilever, IBM, CISCO, Ernst and Young, Deloitte, KPMG, UBS, RBS, Barclays, Goldman Sachs, Bank of America, TATA Consultancy Services and many many more.
Amar Singh: Founder & CEO, Cyber Management Alliance Ltd, Leading Cybersecurity Practitioner & Accredited Trainer
Amar is an APMG Accredited Trainer (approved against the NCSC Certified Training scheme) industry influencer and is recognised globally as a leading risk management and data-privacy professional. Organisations globally seek his input and thought leadership on matters related to cybersecurity and data-privacy. Amar is regularly invited to speak internationally and deliver bespoke cyber resiliency workshops and executive and board briefings.