Currency Converter

Rates are based on those published by the European Central Bank. Please note that these rates are indicative and may differ from those used to calculate prices on our site. If purchasing in GBP, EUR or USD on our site the rates listed on the product pages will be what is used at checkout.

Cyber Security Training Bundle - NCSC Certified

This cyber security training bundle consists of 10x online courses which are certified by the National Cyber Security Centre, NCSC.

90% of cyber attacks are caused by human error, and with global attacks increasing year on year, training your staff to embed safe practices and effective protection across your organisation, keep themselves safe and reduce risks, has never been more critical.

See below for further information.

Sold By: Access Group


Course Modules

  1. Handling Data – the importance of data protection, explains the risks of transferring and storing unencrypted personal data and how to dispose of data once it’s no longer required.
  2. Malware Attack – what malware is, how cyber criminals use it to gain unauthorised access to personal information or systems, and how to spot and report it.
  3. Passwords and Authentication – how to create strong passwords, how password managers can be used and what multi-factor authentication is.
  4. Phishing – what phishing is, how cyber criminals use it to obtain personal data and how to spot then report it.
  5. Protecting Your Business from Cyber Attacks – explores specific risks, responsibilities and the processes required to enhance your organisational resilience to cyber attacks.
  6. Reporting Cyber Crime – what happens when you report a cyber crime, how to report it and who to report it to.
  7. Responding to a Cyber Crime – how to reduce the impact of cyber attacks and restore lost data.
  8. Safe Device Use – explores the possible risks when using devices and removable media and what measures you should take to protect sensitive information.
  9. Staying Safe Online – demonstrates how cyber criminals can exploit social media, the risks of unsecured networks and explains the steps you can take and things you can look out for to stay safe online.
  10. Whaling Attack – explains what a whaling attack is, how cyber criminals use it to gain access to personal data or systems, and how to spot and report it.
Learning objectives

  1. Know how to encrypt and password protect an email attachment using mail services from Google, Apple and Microsoft,
  2. Identify the risks associated with transferring, storing and deleting unprotected personal data, and
  3. Explain what the Data Protection Act 2018 and EU GDPR states all individuals and organisations must do.
  4. Identify the techniques cybercriminals use to carry out malware attacks,
  5. Recognise the risks and impact of a malware attack,
  6. Spot the signs of malware attempts,
  7. Prevent a potential malware attack on your organisation, and
  8. Know what steps to take in the event of becoming a victim of a malware attack.
  9. Confidently use the NCSC’s three random words technique to create strong memorable passwords,
  10. Explain what a password manager is and know how and when to use one, and
  11. Explain what multi-factor authentication is and know how and when to use it.
  12. Describe what phishing is
  13. Identify the techniques cybercriminals use to phish for information,
  14. Identify the common signs of a phishing attack, and,
  15. How to internally and externally report phishing attacks.
  16. Recognise the importance of planning for a cyber attack,
  17. Apply critical steps to prepare your organisation for a cyber attack,
  18. Identify the risks associated with your supply chain,
  19. Manage supply chain cyber risks effectively, and
  20. Enhance organisational resilience against cyber attacks.
  21. Explain in their own words the importance and benefits of reporting cybercrimes, and
  22. Identify the most appropriate authority, team or organisation to report a cyber crime to.
  23. Take appropriate steps to mitigate damage and restore data following a cyber attack,
  24. Report incidents,
  25. Inform internal and external stakeholders,
  26. Review lessons learned from incidents, and
  27. Update organisational plan.
  28. Recognise the techniques cybercriminals use to gain unauthorised access to data and devices,
  29. Identify the risks of using personal devices and removable media to sensitive organisation data,
  30. Store, share and use information and storage devices securely, and
  31. Protect your devices from unauthorised access.
  32. Identify if a website uses HTTPS,
  33. Explain the risks of using public Wi-Fi networks and what to use instead, and
  34. Explain the importance of social media and online privacy settings and how/when to update/change them.
  35. Understand why executives and their assistants can become victims of whaling attacks,
  36. Identify the techniques cybercriminals use to carry out whaling attacks,
  37. Recognise the risks and impact of a whaling attack,
  38. Spot the signs of whaling attempts,
  39. Know the steps you can take to prevent a successful whaling attack on your organisation, and
  40. Know what immediate actions to take in the event of becoming a victim of a whaling attack.

Entry requirements

There are no entry requirements

Course assessment and certification

On successful completion of the final assessment a downloadable certificate is immediately available from your Online Training Academy Dashboard

Weight 5 kg
Course Duration in Minutes





Access Duration

Suitable Devices




Completion Criteria


Available for immediate enrolment


After placing your order online you will receive the following emails;

  • Purchase Receipt Email
  • Account Confirmation Email
  • Online Training Academy Invitation Email

The subject line of your Invitation Email will read:

Thank you for your eLearning Marketplace purchase. You are invited to join The Online Training Academy learning portal.

Click on the link in the email to open the Online Training Academy sign in page and use your email address as your Username and use the Password that you setup during the checkout process.

Your Online Training Academy dashboard will now be displayed and you will see the course you have purchased.

You will be able to access the course for 12 months.

You may also like…


£18.00 excluding VAT

View price in your currency

Keep up to date with what’s happening in the world of education, training and skills. Receive details of offers and newly launched courses, and tips on effective online and blended learning practise by signing up to our monthly newsletter. We guarantee not to sell or pass on your details and you can unsubscribe at any time.