Training and Resources for Information Security Champions

Links to training courses and other resources to help members of the Information Security Champions network develop and maintain relevant knowledge on information security and cyber security.

Please note that the resources on this page are not provided by the University of Edinburgh, and their presence on this page is not indicative of any endorsement of the resource or its provider, or any information or actions within. Where any information provided conflicts with the University Information Security Policy and/or Standards then the University of Edinburgh information takes priority.

Training Courses and Videos

Cyber Griffin "home working" playlist

A useful series of videos on YouTube from the City of London Police giving advice on information security, aimed at general business users working from home but containing good advice in general.

Cyber Security Terminology

A short (under an hour) course on LinkedIn Learning that gives information on some of the terminology and basic concepts that can help you understand more about what is being discussed in other courses or documents.  

Cybersecurity Awareness: Social Engineering

A LinkedIn Learning course where the first section, "Social Engineering Tactics", gives a good overview of several of the social engineering techniques that can be used against us. The rest may be of interest for background.

Cryptography and Networks

A lot of security is now based on cryptography concepts, from protection of data travelling on public networks to how passwords are processed by servers. This 2 hour course on LinkedIn Learning covers general cryptography in some depth and also how it applies to networks.

Cybersecurity Threat Landscape

Recent advances in technology have resulted in more advanced attack methods. This hour long course on LinkedIn Learning covers both old and new attacks.

"IT Security Specialist" Learning Path

This learning path covers the foundations of information security over a very wide range of subjects and courses. You can take the courses in the path as you are able and come back to them at any time, but should be aware that you will not be able to complete them all in one session.

Websites

OWASP Top Ten Project

The Open Worldwide Application Security Project publishes a regular Top Ten of the most common threats to the security of web applications, which can give developers an indication of what they may need to consider.

National Cyber Security Centre

UK Government organisation which helps support UK infrastructure, industries, organisations and the general public from cyber threats.

News, Commentary and Blogs

Infosecurity Magazine

A long established information security magazine, published by Infosecurity Group, a business unit owned and operated by Reed Exhibitions UK Ltd.

Articles by Graham Cluely

Worked in the information security industry since the 1990s and now a writer and media commentator.

Krebs on Security

Blog of Brian Krebs, a journalist and investigative reporter in the information security field.

Troy Hunt's blog

Blog written by the creator of Have I Been Pwned, a site which allows users to see if email addresses they use have shown up in data from security breaches.

Schneier on Security

Personal blog of Bruce Schneier, a cryptographer, privacy expert, and writer.

Awareness Sessions

Information Security Awareness Sessions

Presented by Garry Scobie, the Deputy CISO, these informative and entertaining sessions are run regularly and open to all staff and students.