- Reconnaissance
- Scanning
- Vulnerability assessment
- Exploitation
- Reporting
- Prepare an SOA.
- Define an ISMS policy.
- Define the scope of the ISMS.
- Perform a security risk assessment.
- Manage the identified risk.
- Select controls to be implemented and applied.
- Compliance with the framwork that work best
- Certification.
- Cyber Essentials
- Cyber Essentials +
- ISO27001
- ISO9001
- +Other ISO Frameworks
- PCI-DSS
- NIST
- CIS controls
- DNS Filtering
- Anti-Virus
- MDR
- XDR
- Drive and data encryption
- Email security
- Backup and recovery
- Overview of security Awareness
- Advice on the path to follow
- Strength evaluation
- Material to use
- Training
- Support
- Overview of cybersecurity
- Strength Evaluation
- Advice on the path to follow
- Material to use
- Support
- Computers and associated peripheral devices.
- Computer operating systems.
- Utility/support software.
- Mobile Phones
- Communications hardware and software