Business, Education, Information Technology, Social Care
Access Control List Implementation
9ine Consulting
The course covers topics to improve network security standards through the implementation of access control lists to limit access to network devices in line with the Zero Trust Framework. The module provides a step-by-step guide with associated resources to enable one to assess, plan, and configure networks with ACLs.
Workshop
Business, Education, Information Technology, Social Care
Cyber Awareness Audit and Best Practice
9ine Consulting
Cyberattacks occur through a number of avenues.
These can generally be split into unprotected internet-facing systems or
services and user accounts or devices. With the latter, a user's account or
device is compromised, and when connected to the school network,
vulnerabilities are across other devices and accounts, followed by lateral
movement by the malicious actor until they are in control of sensitive data or
systems. This module takes a look at how to best raise awareness among your
users through simulated phishing.
Workshop
Business, Education, Information Technology, Social Care
Email Protection Implementation
9ine Consulting
Reducing the risk of a phishing attack is technically possible through implementing measures such as SPF, DKIM, and third-party email filtering solutions. This module follows a step-by-step approach to evaluate, configure, and implement these solutions.
Workshop
Business, Education, Information Technology, Social Care
Filtering Audit and Best Practice
9ine Consulting
Filtering internet access is a legal requirement in some countries to support school leaders in identifying users who are at risk of harm. The concerns addressed in this workshop cover accessing inappropriate content, perpetuating cyberbullying, or where the aggregate activity online over time points to risks that need to be managed. This module also looks at the school's role in managing access to content, filtering that content, user identification, and monitoring users.
Workshop
Business, Education, Information Technology, Social Care
Firewall Audit and Best Practice
9ine Consulting
Firewalls are critical to keeping school systems safe and secure. They also play a fundamental role in the technical performance of all systems and devices that rely on the internet. This step-by-step module takes an organisation through the planning, technical configuration, and implementation of setting up or auditing a Layer 7 firewall.
Workshop
Business, Education, Information Technology, Social Care
Incident Response Audit and Best Practice
9ine Consulting
An incident management procedure plan is critical to responding to a cyberattack, data breach, or significant failure of IT systems and services. This module follows a framework to enable your school to implement an incident response policy and procedure for recording, assessing, and managing incidents. Importantly, the framework has embedded within it the assessment of privacy risks as a consequence of the incident and the need to report to the regulator, other authorities, and data subjects (parents, students, and staff).
Workshop
Business, Education, Information Technology, Social Care
Network Switching Audit and Best Practice
9ine Consulting
This foundation module covers auditing and configuration of your school network to minimise the ability for lateral movement through the network and implement effective network operational management and administration. This covers off network design, VLAN segregation, Port Level Authentication, and 802.1X.
Workshop
Business, Education, Information Technology, Social Care
Wireless Audit and Best Practice
9ine Consulting
A well-designed and configured wireless network plays a critical role in facilitating the effective operations of a school. This module guides individuals through a framework for assessing a school's current network and identifying areas for performance and security enhancements. Topics covered include access point heatmaps, channelling, configuration, and security.
Workshop