🧠 CPSA Training – Week 3

CREST CPSA

Sections C4 to E2 – Cyber Shenanigans Continue!

Another week, another deep dive into the world of cybersecurity. From policy loopholes to phishing fails, here’s what we tackled in Week 3 of CPSA training:

πŸ” C4: Security Policy and Standards

We looked at how policies are the backbone of any secure organisation (yes, even if no one actually reads them). Think of these as the rules that keep everyone from turning the network into digital chaos.

πŸ•΅οΈβ€β™‚οΈ C5: Vulnerability Management

Imagine playing whack-a-mole, but the moles are security holes. We explored how vulnerabilities are identified, prioritised, and patched – and why ignoring them is like leaving your front door open with a sign that says “Hack me.”

πŸ“‹ D1: Incident Response Process

When things go wrong (and they will), a solid incident response plan stops panic in its tracks. We walked through what to do when the fire alarm goes off in your digital world – from detection to containment and recovery.

πŸ“¦ D2: Asset Management

It’s hard to protect what you don’t know you own. We covered why knowing your assets – from dusty laptops to critical servers – is essential, and how to keep track of them all without losing your mind.

🧩 E1: Security Architecture Fundamentals

A crash course in building strong, layered security from the ground up. Think of this as LEGO for grown-ups – stacking security blocks in the right order so it doesn’t all fall apart.

πŸ•ΈοΈ E2: Security Models

Finally, we dipped our toes into the world of security models – Bell-LaPadula, Biba, and all their theoretical glory. Ideal if you like logic puzzles… and headaches.