Information and Cyber Security

Further Information

For further information on URM's training portfolio, or for course availability, please
- phone 0118 902 7453
- email our training manager
- use our online request form.

Information and Cyber Security Training Courses

As an organisation’s most important asset, it is vital that information is adequately protected by IS professionals who can assure its confidentiality, integrity and availability. Understanding the level of control required and how to achieve the optimum balance between restriction and flexibility to meet an organisation’s business needs is a key requirement. As a BCS Gold Partner and with a 12 year track record of successfully supporting organisations and individuals to understand and achieve that balance, URM is ideally placed to provide you with a range of training courses to help you better protect your organisation’s information. All courses are aligned with international standards such as ISO 27001 and are delivered by senior, experienced practitioners who bring real world implementation experience to the classroom along with valuable anecdotes to illustrate and reinforce the theory being taught. URM’s information security courses are split between professional certificate courses where you are required to pass an end of course examination, invigilated and administered by an independent third party and non-certificate introductory or implementation courses.

Professional Certification Courses

BCS Certificate in Information Security Management Principles (CISMP)

URM’s BCS Certificate in Information Security Management Principles (CISMP) 5 day course provides you with a detailed but holistic understanding of the concepts which underpin information security management. URM's CISMP course is the only course in the UK to have been certified both by IISP and as part of the GCHQ Certified Training (GCT) scheme.

The course focuses on the need for organisations to identify and adopt management and technical solutions to tackle the information related risks which can jeopardise an organisation's ability to achieve its business objectives. CISMP provides you with a comprehensive overview of how organisations should select and implement controls based on the security risks they face.

Excellent presentation from the trainer. Very knowledgeable, approachable and personable. Ideal mix of course material and personal experience as a consultant. Use of stories to apply principles was excellent.

Public course 2017

Use of stories to apply principles was excellent.

Public course 2017

Our trainers will fully prepare you to take and pass the BCS administered 2 hour multi-choice examination. URM is the most experienced CISMP training provider with a 12 year track record with unrivalled rates (98% pass rates and 75% distinction rates in 2015) and exceptional delegate feedback.

Delivered as both a public schedule and closed, on-site course.
Full course outline

BCS Logo
IISP Logo
GCT Logo

Certificate in Implementing ISO 27001 (certified by GCHQ)

This unique 3 day certificate course, delivered by URM’s practising consultants, is aimed at providing you with a comprehensive understanding and practical interpretation of the key steps involved in planning, implementing and maintaining an ISO 27001 compliant information security management system (ISMS). Key topics include determining the scope of your ISMS, establishing leadership and commitment, developing a governance framework, undertaking a risk assessment, understanding the control groups within Annex A and ensuring continuous improvement. The course has been independently validated and assessed as part of the GCHQ Certified Training (GCT) Scheme. By the end of this course, you will be prepared to take and pass a multi-choice examination which has been developed by and administered by APMG International (Independent Certification Body for GCHQ-approved cyber security training courses). URM has a 14 year track record assisting nearly 150 organisations to achieve and maintain ISO 27001 certification and all our courses are led by our experienced and practising ISO 27001 consultants. As such, you can be assured that you will receive pragmatic and invaluable instruction on implementing ISO 27001 in the real world.

Delivered as both a public schedule and closed, on-site course.
Full course outline

APMG Logo
GCT Logo

Non-certificate Courses

ISO 27001 Auditing Course

This 2 day course, delivered by URM’s practising information security auditors is aimed at individuals who are responsible for acting as internal auditors for organisations that are planning to, or are already complying or certifying to ISO  27001:2013 (ISO 27001), the International Standard for Information Security Management. The objective of the course is to provide you with clear and practical guidance on how to audit an ISO 27001 compliant or certified information security management system (ISMS).
By the end of the 2 days, you will be able to document your skills in undertaking audits, identifying nonconformities and assessing opportunities for improvement.

Delivered as both a public schedule and closed, on-site course.

1 Day Introduction to Information and Cyber Security

This 1 day introductory course provides you with essential guidance on how your organisation can most effectively improve its information security. Based on best practice principles (as defined by ISO 27001 the International Standard for Information Security Management and ISO 27002, the Code of Practice) this course provides you with an introduction to developing, implementing and measuring effective information security. Course contents and exercises are tailored to your organisation and industry sector.

Delivered as a closed, on-site course.

1 Day Understanding and Interpreting PCI DSS Requirements Course

This 1 day course is aimed at providing you with an understanding and insight into the requirements of Payment Card Industry Data Security Standard (PCI DSS) V3.2 and exactly how it applies to your organisation. The course addresses what is involved in a PCI DSS assessment and focuses on the interpretation of the Standard’s 12 control requirements and sub-requirements. The objective of the course is to provide you with clear and practical guidance on how to apply the requirements within your organisation. By the end of the day, you will be able to describe what PCI DSS is and how it applies to your organisation, which of the self-assessment questionnaires or assessments you need to complete and what is involved in the assessment process. You will also gain an understanding of some of the related PCI standards. All courses are led by our experienced PCI consultants and qualified security assessors (QSAs).

Delivered as a closed, on-site course.
Full course outline