Qureos

FIND_THE_RIGHTJOB.

Trainer on Cyber Security and Management Training

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

Freelance Trainer on CYBER SECURITY RISK ASSESSMENT AND MANAGEMENT TRAINING COURSE (APPLY ONLY IF YOU ARE A TRAINER)

Course Overview Today’s organizations do not just want IT controls; they demand justified, risk-based cyber security decisions. Whether you are approving a new system, moving to the cloud, engaging a third-party vendor, or rolling out a digital service, leaders are expected to understand the cyber implications and demonstrate that risks are assessed, prioritized, and managed. This course transforms cyber security risk assessment from a technical checklist into a practical management tool. Participants will not become penetration testers, but they will become disciplined evaluators of cyber exposure. They will learn how to identify critical assets, map threats and vulnerabilities, assess likelihood and impact, score and prioritize risks, and select cost-effective controls. Additionally, participants will align cyber risk decisions with legal, regulatory, and governance requirements and communicate risk clearly to executives and non-technical stakeholders. The course is hands-on, scenario-based, and tailored for leaders and managers who must integrate cyber risk thinking into projects, operations, and strategy.

By the end, participants will be equipped to ask better questions, challenge assumptions, and support their organizations in building a stronger security posture.

Target Audience This course is designed for professionals who regularly make or influence decisions that affect cyber security risk: This course is designed for: IT managers and system owners responsible for critical applications and infrastructure Information security and risk officers involved in cyber risk assessment and reporting Compliance and governance professionals overseeing security, privacy, and regulatory requirements Public sector staff managing digital services, citizen data, or national systems NGO and development program leaders handling sensitive beneficiary and donor information Procurement and vendor management teams evaluating third-party and cloud service providers Finance and operations managers approving security budgets and investments HR and people managers responsible for policies, access, and staff awareness Project managers leading digital transformation, system upgrades, or new platforms Anyone who must understand, explain, and justify cyber risk decisions to stakeholders

Learning Objectives This course equips you to identify, assess, prioritize, and manage cyber security risks in a structured, business-aligned way.

By the end of this course, you'll be able to: Understand core principles of cyber security risk assessment and risk management Identify critical assets, data, and processes that must be protected Recognize common threats, vulnerabilities, and attack paths across sectors Assess likelihood and impact to generate clear, comparable cyber risk ratings Prioritize risk treatment options using structured, risk-based decision-making Select and justify appropriate controls, safeguards, and mitigation measures Communicate cyber risks and treatment plans clearly to technical and non-technical stakeholders Align cyber risk decisions with legal, regulatory, and organizational governance frameworks

Professional and Organizational Impact When you think in terms of cyber risk, impact, and likelihood, you move from reacting to incidents to leading secure, informed decisions. As a participant, you will benefit by: Improve your ability to interpret and explain cyber risk reports and dashboards Gain confidence when challenging, approving, or defending cyber-related investments Reduce guesswork and fear-driven decisions about security controls and tools Strengthen your strategic planning by integrating cyber risk into project and portfolio decisions Position yourself as a trusted partner between technical teams and senior leadership Enhance your reputation as a risk-aware, security-conscious professional Build your influence in digital transformation, compliance, and governance discussions

Organizations led by cyber risk thinkers are more resilient, trusted, and prepared for disruption. Your organization will benefit from: Smarter use of security budgets and technology investments More consistent, transparent, and documented cyber risk decisions Stronger alignment between security controls and business priorities Reduced likelihood and impact of incidents, breaches, and service disruptions Faster and more coordinated response when an incident occurs Improved compliance with regulations, standards, and audit expectations Increased stakeholder confidence in how digital assets and data are protected

Training Methodology This is a practical, outcome-driven course designed to turn cyber security risk theory into daily decision-making power. Methodology includes: Interactive cyber risk assessment exercises using realistic scenarios Threat and vulnerability mapping for real-world systems and processes Simple tools, checklists, and templates for risk registers and treatment plans Role-playing for presenting cyber risk and treatment options to executives Group work comparing different risk treatment strategies and control options Case studies from public, private, and NGO environments, including breaches and lessons learned Reflection prompts to challenge current security assumptions and habits Course Outline

MODULE 1: PRINCIPLES OF CYBER SECURITY RISK THINKING What cyber risk is and why it matters beyond IT Understanding assets, threats, vulnerabilities, impact, and likelihood Cyber risk vs. information security vs. IT operations When to apply cyber risk assessment in projects and operations Common missteps in framing cyber risk as purely technical

MODULE 2: IDENTIFYING CRITICAL ASSETS, DATA, AND PROCESSES Mapping business services, systems, and information flows Classifying data by sensitivity, criticality, and regulatory requirements Identifying 'crown jewels' and single points of failure Considering people, technology, and third-party dependencies Using asset registers and data inventories

MODULE 3: THREATS, VULNERABILITIES, AND EXPOSURE. Common threat actors and tactics (internal and external) Typical vulnerabilities in applications, infrastructure, and processes Human factor risks: social engineering, weak practices, insider threats Emerging risks from cloud, mobile, and remote work models Simple techniques to map and visualize threat paths

MODULE 4: CYBER RISK ASSESSMENT AND SCORING Qualitative vs. quantitative approaches to risk assessment Estimating likelihood and impact with practical scales Risk matrices, heat maps, and scoring models Using scenarios and what-if analysis to test assumptions Creating and maintaining a cyber risk register

MODULE 5: SELECTING AND EVALUATING SECURITY CONTROLS Types of controls: preventive, detective, corrective, and compensating Aligning controls with frameworks such as ISO 27001 or NIST CSF Assessing control effectiveness and control gaps Balancing usability, cost, and security requirements Prioritizing controls based on risk reduction and value for money

MODULE 6: CYBER RISK MANAGEMENT IN PROJECTS AND CHANGE INITIATIVES Integrating risk assessment into system development and procurement Evaluating cloud services, third-party platforms, and outsourcing arrangements Security requirements in contracts and service level agreements Managing risk during digital transformation and system upgrades Case examples from public, NGO, and corporate projects

MODULE 7: GOVERNANCE, COMPLIANCE, AND REGULATORY EXPECTATIONS The role of policies, standards, and governance structures Data protection, privacy, and sector-specific regulations Documentation, evidence, and audit readiness Roles and responsibilities: boards, executives, IT, and business units Aligning cyber security with enterprise risk management

MODULE 8: HUMAN FACTORS AND SECURITY CULTURE Why people are both the weakest link and strongest defense Designing effective awareness and training programs Policy design that supports, rather than frustrates, staff Handling user resistance and fatigue toward security measures Measuring and reinforcing security culture improvements

MODULE 9: INCIDENT RESPONSE AND BUSINESS CONTINUITY INTEGRATION Linking risk assessment with incident response planning Identifying likely incidents and preparing playbooks Roles and communication during an incident Learning from incidents: root cause, lessons, and improvements Ensuring continuity of critical services during cyber disruptions

MODULE 10: COMMUNICATING AND DEFENDING CYBER RISK DECISIONS Tailoring messages for executives, boards, regulators, and technical teams Using visuals, dashboards, and summaries to explain risk clearly Reporting assumptions, limitations, and residual risk transparently Handling scrutiny and difficult questions about security decisions Turning cyber risk discussions into shared understanding and action

Please apply with CV and Photograph only if you are a freelance Trainer. If you do not have training experience PLEASE DO NOT APPLY

Job Types: Part-time, Permanent, Contract
Contract length: 24 months

Pay: AED50.00 per hour

Expected hours: 40 per week

© 2025 Qureos. All rights reserved.