Digital Risk Protection Officer Training - CPD Certified

FREE PDF Certificate | Audio Visual Training | 40 CPD Points | Assessment Included | Tutor Support | 1 Year Access



Save 95%
£15 inc VAT (was £317)
Offer ends 15 August 2020
Study method
Online, self-paced
70 Hours
Access to content
1 Year
No formal qualification
40 CPD hours / points
Additional info
  • Exam(s) / assessment(s) is included in price
  • Tutor is available to students

13 students purchased this course

Add to basket or enquire


Protect your computer’s system and networks, and keep your data safe from hackers and cyber attacks with the Digital Risk Protection Officer Training course. This cybersecurity training course provides essential training on risk management.

In this course, you will learn how to protect against viruses and malicious threats through risk mitigation, penetration testing, and malware analysis. You will also be trained on how to identify risks and respond to threats and will be introduced to analytical techniques for securing your WLAN network.

This cybersecurity training course is ideal for aspiring information security analysists and cybersecurity professionals. It will also benefit anyone who wishes to protect their sensitive data online.

Learning Outcomes of The Digital Risk Protection Officer Training:

  • Learn the basics of cybersecurity risk management and risk assessment
  • Understand the different types of risk mitigation: risk avoidance, acceptance, transference & limitation.
  • Discover tips & tricks for analysing attacks and assessing the impact of threats
  • Learn post-attack techniques and how to implement a forensic investigation plan
  • Familiarise with WLAN digital security networking basics
  • Understand the different types of authentication and the authentification process in network security
  • Learn how encryption helps to keep your personal and private data secure
  • Understand how to protect yourself against wireless security hacks


40 CPD hours / points
Accredited by CPD Accreditation Group

Course media


Benefits of studying the Digital Risk Protection Officer Training Course

  • Earn a free e-certificate upon successful completion.
  • Accessible, informative modules taught by expert instructors
  • Study in your own time, at your own pace, through your computer tablet or mobile device
  • Benefit from instant feedback through mock exams and multiple-choice assessments
  • Get 24/7 help or advice from our email and live chat teams.

Course design

The Digital Risk Protection Officer Training course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons
  • Online study materials
  • Mock exams
  • Multiple-choice assessment

************************** Course Modules **************************

Overview of Wireless Communications

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Analyzing the Threat Landscape

  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats

Analyzing Recon Threats to Computing and Network Environments

  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing

Analyzing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security

Analyzing Post-Attack Techniques

  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics

Evaluating the Organization’s Security Posture

  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing

Collecting Cyber security Intelligence

  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files

Analyzing Log Data

  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions

Performing Active Asset and Network Analysis

  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux-Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • And Much More....

Responding to Cyber security Incidents

  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT

Investigating Cyber security Incidents

  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation

WLAN Security Overview

  • WLAN Security Overview and Data Privacy
  • Networking Basics
  • Web GUI Introduction
  • Security Options

Legacy Security

  • Legacy Security
  • VPNs
  • Security Association
  • MAC Spoofing

Encryption Ciphers and Methods

  • Encryption Ciphers and Methods
  • TKIP
  • CCMP
  • Encryption Examples

802.11 Authentication Methods

  • 802.11 Authentication Methods
  • 802.1X
  • EAP
  • Certified Authority Server Credentials

Dynamic Encryption Key Generation

  • Dynamic Encryption Key Generation
  • Authentication and Key Management
  • RSNA Key Hierarchy
  • EAP
  • Information Elements

SOHO 802.11 Security

  • SOHO 802.11 Security
  • Wi-Fi Protected Setup (WPS)
  • Cracking Hashes

Fast Secure Roaming

  • Fast Secure Roaming
  • FT Key Hierarchy (e-notes)
  • 802.11K-2008

Wireless Security Risks

  • Wireless Security Risks
  • Authentication Attacks
  • Rogue Devices
  • Public Hotspots

Wireless LAN Security Auditing

  • Wireless LAN Security Auditing

Wireless Security Monitoring

  • Wireless Security Monitoring
  • Device Tracking

VPNs, Remote Access and Guest Access Services

  • VPNs, Remote Access and Guest Access Services
  • Remote Access

WLAN Security Infrastructure

  • WLAN Security Infrastructure
  • Management Protocols
  • Other RADIUS Solutions

Wireless Security Policies

  • Wireless Security Policies
  • Other Policies

Information Security Governance

  • Information Security Governance Overview
  • Effective Information Security Governance
  • Information Security Concepts and Technologies
  • And Much More........

Information Risk Management

  • Risk Management Overview
  • Good Information Security Risk Management
  • Information Security Risk Management Concepts
  • And Much More...

Information Security Program Development

  • Development of Information Security Program
  • Information Security Program Objectives
  • Information Security Program Development Concepts
  • And Much More...

Information Security Incident Management

  • Incident Management Overview
  • Incident Response Procedures
  • Incident Management Organization
  • Incident Management Resources
  • And Much More...

Healthcare Information Systems Security

  • The Healthcare Industry
  • The Healthcare Regulatory Environment
  • Privacy and Security in Healthcare
  • Information Governance and Risk Management
  • Information Risk Assessment
  • Third-Party Risk Management

Disaster Recovery

  • Welcome to Disaster Recovery Training
  • Business Impact Analysis
  • Risk Analysis8
  • And Much More.....

Digital Forensics Examination

  • Introduction
  • Computer Forensic Incidents
  • Investigation Process
  • Disk Storage Concepts
  • Digital Acquisition & Analysis
  • Forensic Examination Protocols
  • And Much More...

Incident Handling Engineer

  • Introduction
  • Threats, Vulnerabilities and Exploits
  • IH Preparation
  • Request Tracker for Incident Handling
  • Preliminary Response
  • And Much More...

Security Leadership Officer

  • Security Management
  • Risk Management
  • And Much More........

Security Sentinel

  • Basic Security
  • User Awareness 33
  • Implementing Countermeasures
  • Certified Security Sentinel
  • And Much More........


Upon successful completion of the course, you will be able to obtain your course completion PDF certificate free of cost. Print copy by post is also available at an additional cost of £9.99

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.


Currently there are no reviews for this course. Be the first to leave a review.


What does study method mean?

Study method describes the format in which the course will be delivered. At courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

What are CPD hours/points?

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on, many of which can be completed online.

What is a ‘regulated qualification’?

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

What is an ‘endorsed’ course?

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body’s logo if they wish. Certain awarding bodies - such as ABC Awards and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.


Mobile Navigation