The structure of the course content is listed here with useful links and downloadable PDFs above & below.
We've done this so you can open the links or pdfs automatically in a different page, for convenience.
Week 1
1.1. Work From Home Infographic Link here or below PDSC
Week 2
Week 7
7.1.Exercise in a Box by NCSC: Link below
7.2.Business In The Community Readiness Test: Link below
7.3.Incident Response Plan Leaflet Downloadable PDF above
7.4.CHECK certified Pen Testers by NCSC: Link below
7.5.Cyber Incident Response Certified Companies by NCSC: Link below
7.6.Cyber protection: Preventing business paralysis Blog by PEN Underwriting Link below
7.7.Social Engineering Blog: Link below
Week 8
8.1.Global Cyber Alliance Prevent Phishing andViruses Toolkit: Link below
8.2.Background Security: Anti-Virus/Anti-Malware & Firewalls blog: Link below
8.3.How to turn on the Firewall Leaflet Downloadable PDF above
8.4.Malware Glossary Infographic Downloadable PDF above
8.5.AntiVirus Extra Features Leaflet Downloadable PDF above
8.6.Staying Safe Online by Bob’s Business: Link below
8.7.Mastering Malware Video by Bob’s Business: Link below
Social Media Week 9
9.1.How the PDSC can help Video. Include the link to our Digitally Aware and Digitally Resilient certification schemes: Link below
9.2.Investing in cyber security certification Blog by IASME: Link below
9.3.Cyber Essentials Leaflet by NCSC Downloadable PDF above
9.4.NCSC certification-where to become certified and how to find certified services: Link below
9.5.The importance of cyber security Blog: Link below
9.6.Small Business Guide Infographic by NCSC Downloadable PDF above
9.7.10 Steps To Cyber Security Infographic by NCSC Downloadable PDF above
Week 10
10.1.What would a cyber attack look like in the real world by Hiscox: Link below
10.2.Money Mules Video by Met Police: Link below
10.3.Sign up to threat alerts Leaflet Downloadable PDF above
10.4.Payment Fraud by Met Police: Link below
10.5.NCSC Weekly Threat Report: Link below
10.6.Glossary of technical terms Infographic and Glossary of common attacks Infographic
10.7.Online Shopping Video by Met Police: Link below
Week 11
11.1.Asset Management Benefits Leaflet Downloadable PDF above
11.2.Know What You Have Toolkit by Global Cyber Alliance: Link below
11.3.Restrict user privileges to reduce the insider threat Blog: Link below
11.4.Tips to manage user privileges Leaflet Downloadable PDF above
11.5.Removable Media Do’s and Don’ts Leaflet Downloadable PDF above
11.6.The problems with removable media Video Link below
11.7.How to safeguard your organisation against removable media Video Link below
Week 12
12.1.Protect your email and reputation Toolkit by Global Cyber Alliance: Link below
12.2.MailCheck by NCSC: Link below
AND Email security and anti-spoofing advice by NCSC: Link below
12.3.Phishing Scams Blog by TSB: Link below
12.4.What Is Phishing And How To Prevent It Blog by Check an Invoice: Link below
12.5.Hackers?... Stopped! Understanding the Criminal’s Secrets... Blog by BLOCKPHISH: Link below
12.6.Why you can’t rely on Office 365 alone for security? Video by Westtek Solutions: Link below
12.7 Easy ways to spot a dodgy email Video by Westtek Solutions: Link below
Week 13