Course Description
This course will offer a great opportunity for individuals and organisations to invest in the awareness on various cyber-criminal and cyber-terrorism techniques and trends being practiced in today’s world. On the other hand, individuals who undertake this course will enhance their chances to find career opportunities by showing knowledge and capabilities to contribute to the information security awareness of the organisation and the respective team which they will eventually form part of.
Accreditation and MQF level
The accreditation status of this programme is a ‘‘Higher Education Programme’’. A CPD Award accredited with 6 ECTS credits (MQF/EQF Level 5) by the Malta Further & Higher Education Authority (MFHEA) in Counter Cybercrime and Terrorism will be presented to delegates who successfully attend all modules and obtain a minimum pass in a final 3 hour written examination (60% of aggregate mark) and in in-class group case study assessments (40% of aggregate mark).
Target Audience
This continual professional development (CPD) Award is ideal for:
- Individuals who work in Front and Back End software development employees and other employees working with computers and networks
- IT departments
- Senior and Middle Managers
- Internal Audit and Risk function employees
- Anyone starting a career in Information / Cyber security
- IT professionals wanting to transition their career into Cyber Security
- Individuals requiring an introduction to Cyber Security
- Individuals planning to work in a position which requires cyber security knowledge
- Individuals with a current information and cyber security responsibilities role
- Individuals who have learned “on the job” but would benefit from a formal training to consolidate their knowledge
- Professionals familiar with basic IT and information security concepts
Entry requirements
The entry requirements for this course are:
- a minimum of 2 A Levels or equivalent MQF Level 4 qualifications OR minimum of 3 years working within an I.T related organisation.
- Sound knowledge in IT
- Fluent computer use knowledge
- This course welcomes individuals from the legal age of 18 onwards.
- Maturity Age is set at 23 years
Duration & Mode of Attendance
This part-time course is made up of 12 live online evening webinar sessions which are spread over a period of 14 weeks.
Course Delivery Mode – Live Webinars
This course will be delivered via live online webinars. The course trainers will be visible on screen via a professional webinar platform through which students can follow the trainer presenting live whilst also using a PowerPoint presentation and sharing other resources as necessary. Students will be able to interact with the trainer by sending questions or comments through the same webinar platform. Our student support team will assist all students with simple instructions on how to access the webinar online. A support line will also be made available to communicate with a student support officer in case of technical difficulties encountered during the live webinar.
Trainers will also dedicate very regular Q & A times during the webinar to ensure all students can have the chance to ask questions and reach the intended learning objectives. The email and contact details of the trainer will also be made available in case students would wish to get in touch with the trainer throughout the course period. Online recordings or videos of the webinars are not available for this course.
Short 10 minute breaks will be given during the webinar.
How You’ll Learn
This course will be delivered via live online webinars. The course trainers will be visible on screen via a professional webinar platform, through which students can follow the trainer presenting live, whilst also using a PowerPoint presentation and sharing other resources as necessary.
Students will be able to interact with the trainer by sending questions or comments through the same webinar platform.
The course will also make use of:
- Online Presentations
- Video Lecturing;
- Q&A via online course forum;
- Online Q&A with Educator (Trainer).
The above are considered to be contact hours as all of the above will be under control of the instructor.
Method of Assessment
Delegates must successfully attend all modules and obtain a minimum pass in a final 3 hour written examination (60% of aggregate mark) and in in-class group case study assessments (40% of aggregate mark).
Language of Course Instruction & Course Materials
The course materials and the live webinars are in English.
Course Dates
Modules |
Dates |
Time |
Module 1: Foundations of Information Security (MQF/EQF Level 5, 2 ECTS) |
TBC |
1730-2030 |
Module 2: Cyber Assessments & Incident Response (MQF/EQF Level 5, 2 ECTS) |
TBC |
1730-2030 |
Module 3: Information Systems Auditing and Management (MQF/EQF Level 5, 2 ECTS) |
TBC |
1730-2030 |
Total Hours of Learning
This is an accredited course, which requires students to commit themselves and to be responsible for their own studies. Below is a suggested guideline of the number of hours each student should dedicate to self-studying and preparing for the final written assignment.
Total Course Contact Hours
(Live Online Webinars) |
30 |
Total Course Suggested Self-Study Hours
(reading for interest & further knowledge) |
114 |
Total Course Supervised Placement and Practice Hours
(Work placement supervision) |
0 |
Total Course Suggested Assessment Hours
(Take home assignment) |
6 |
Course Outline
Module 1: Foundations of Information Security
Trainer: Jonathan-Mark Bezzina Gatt
ECTS credits: 2
Learning Outcomes:
- At the end of the module/unit the learner will be able to:
- Have a basic understanding of what is the cyber-world and how criminals are exploiting it;
- Know the difference and able to identify cyber-criminal activities
- Understand preventive, corrective and detective measures;
- Learn from real life scenarios and gain awareness on the importance of cyber security;
- Identify the difference between criminal and terrorism activities;
- Identify the main typologies, characteristics, activities, actors and forms of cybercrime;
- Identify the various important resources which the cyber-world can offer to the criminal;
- Identify what is making Malta one of the targets for cyber-criminals
Module 2: Cyber Assessments & Incident Response
Trainer: Jonathan-Mark Bezzina Gatt
ECTS credits: 2
Learning Outcomes:
At the end of the module/unit the learner will be able to:
- Provide recommendations to management on what type of assessment is fit for the company;
- Participate in Incident Response planning and execution;
- Kick Off, Execute and Test a Disaster Recovery Exercise;
- Understand the difference between the different types of cyber assessments;
- Understand the need of an Incident Response Plan;
- Differentiate the Incident Response options and scenarios;
- Gain awareness on Disaster Recovery techniques.
- Differentiate between Assessment Types;
- Select right assessment type for a target system or asset at the company;
- Differentiate between incident types and right response options;
- Select disaster recovery options and calculate potential loss.
Module 3: Information Systems Auditing and Management
Trainer: Jonathan-Mark Bezzina Gatt
ECTS credits: 2
Learning Outcomes:
At the end of the module/unit the learner will be able to:
- Understand the governance structure of cyber security teams;
- Gain knowledge on the industry best practices and on how major corporations managed to establish their world-leading cyber security teams;
- Understand how audits work and what the role of an IS Audit function;
- Understand the relationship between audit and business functions and learn the engagement models.
- Contribute effectively in management meetings regarding cyber security investments and decisions;
- Provide insight on cyber security trends and be able to effectively govern IS teams;
- Participate in IS Audit exercises first as an Auditee and later on as an Auditor .
- Understand, discuss and plan basic Information Systems Auditing & Management concepts and terms with others
- Understand and discuss basic Security Domains frameworks with others
Trainers
Jonathan-Mark Bezzina Gatt

Jonathan has graduated from Stockholm University with an MSc. Information Security. He currently resides in Stockholm. Jonathan consults with D4n6 over various client projects ranging from the implementation of Information Security Management Systems, ISO 27001 readiness and awareness training in the field of information security.
With a background in social sciences, his approach to information security is multi-disciplinary and multi-faceted, tapping into the psychology of threat agents when evaluating the security posture of an organization.
Course Funding Options
For Individuals
-
GET QUALIFIED SCHEME
Candidates can benefit from a 70% rebate of the course fee via tax credit. Get Qualified is an initiative that supports the personal development of individuals for the achievement of qualifications and certifications required by industry.
Learn more about this scheme »