Skip to course content

Cybersecurity course

Protect services, data, and delivery choices before small weaknesses become systemic failures.

My three level cybersecurity course that takes learners from basic online safety to professional risk and security practice, using interactive tools and everyday examples.

  • 3 stages
  • Module-first learning
  • CPD evidence

Recommended starting point

Choose the first module, not a long intro

If you are new, start with Foundations. If you already have a live service or control problem, move to the stage that fits the issue and use the module pages to work one decision at a time.

What you will get

This course is for people who need security to become clearer, more proportionate, and easier to act on. You will learn how to describe risk, review a service for exposure, explain identity and trust boundaries, and choose practical controls without pretending every problem needs a giant framework exercise.

The Cybersecurity learning model
Protect the outcome, test the threat path, choose the control, then review and improve.
Asset oroutcomeThreat orfailure pathControl orresponseMeasure andimproveharmreducereviewretest risk

By the end

  • • You can explain cyber risk, trust boundaries, identity, and response in plain working language.
  • • You can review a service, workflow, or release path for likely exposure and proportionate controls.
  • • You can keep small CPD artefacts such as threat models, access notes, remediation choices, and response plans.
  • • You can tell when Cybersecurity should come first and when Data or Digitalisation should come before it.

Where Cybersecurity fits

Cybersecurity should come early when the immediate problem is trust, identity, exposure, phishing, incident readiness, or controls around a live service. It is not the only sensible place to start. If the first gap is understanding data meaning or digital service change, start with Data or Digitalisation and come back here once the service context is clearer.

Best for operations, public service, and mixed teams

Protect services and teams

Start here when the immediate problem is trust, identity, phishing, incident response, or weak security habits around a live service.

  1. 1. Cybersecurity Foundations
  2. 2. Applied Cybersecurity
  3. 3. Cybersecurity Practice and Strategy
  4. 4. Data

Best for product, engineering, and delivery leadership

Build secure digital delivery

Use this route when you need to connect service design, threat modelling, release gates, logging, and governance instead of treating security as a late-stage review.

  1. 1. Digitalisation
  2. 2. Cybersecurity Foundations
  3. 3. Applied Cybersecurity
  4. 4. Software Architecture

Best for network, infrastructure, and platform work

Strengthen technical assurance

Choose this path when you need a clearer model of trust boundaries, cloud exposure, telemetry, vulnerability flow, and hardening decisions across technical systems.

  1. 1. Network Models
  2. 2. Cybersecurity Foundations
  3. 3. Cybersecurity Practice and Strategy
  4. 4. AI

Course structure

The course is organised as calm stage pages and shorter module pages. Each module focuses on one security decision pattern, includes one quick retrieval check, and ends with one reflection prompt and one evidence artefact so the learning stays usable rather than sprawling.

Stage 18 hours9 modules

Cybersecurity Foundations

Start here when you need security to become clearer, calmer, and easier to explain in everyday work rather than more intimidating.

Artefact: A foundations review with one service, one risk, one trust boundary, and one control improvement.

Stage 216 hours7 modules

Applied Cybersecurity

Use this stage when you need to review a live service, feature, or product decision and want a clearer way to reason about the control work around it.

Artefact: An applied review pack with one threat model, one control decision, and one telemetry or gate recommendation.

Stage 332 hours9 modules

Cybersecurity Practice and Strategy

This stage is for people who need security to hold up under delivery pressure, operational complexity, and accountability rather than just in a static checklist.

Artefact: An assurance brief with delivery controls, response logic, governance notes, and one prioritised next action.

Artefacts and evidence

The course is designed to leave you with outputs you can reuse. You should finish with risk notes, access reviews, threat models, release checks, remediation priorities, and response plans rather than vague confidence claims.

  • • Foundations: one asset-and-risk note, one trust boundary sketch, one control improvement.
  • • Applied: one threat model, one access or exposure review, one detection or release recommendation.
  • • Practice and Strategy: one assurance brief, one remediation or response decision, one governance note.

CPD and evidence

Keep CPD simple. Set a goal, complete the module, write one honest reflection, and keep one small artefact. That is enough to make the learning measurable and easier to defend later without turning it into bureaucracy.