The SRMC® course has been specially designed by subject experts to provide a comprehensive and diverse learning experience that aims to equip individuals with the practical skills, knowledge and competence to operate confidently, and credibly, as a Security and Risk Management Consultant.


Throughout the distance learning course we enable you to achieve a broad and comprehensive understanding of risk management and its associated practices. The goal is to not only significantly improve your skill set and gain a selection of recognised qualifications, but to also develop your practical understanding and widen your future career opportunities. As an example, many of our former students have gone on to secure senior positions within the 'Big Four' consultancies; Energy and Extractives, Aviation, Defence and Media, as well as other leading risk management organisations. The course will also equip you with the skills required to consult in a broad range of risk management and business practices.


Unit 5, Information and Cyber Security, will dive into the online world of information security. This will cover not only cyber but the wider threats and risks related to information, data management and espionage. The Unit provides an opportunity for you to build knowledge and confidence in your awareness of the multiple challenges to organisational security and viability through the loss of information, and of the mitigations necessary to preserve information integrity and availability.


Course curriculum

    1. Key Documents

    2. Book 1-to-1 Course Tutor Meetings

    3. Introductory Resource Overview

    4. Information and Cyber Security Learning Resources

    1. Assignment Guide

    2. Unit 5 Assignment Brief

    3. SRMC Level 6 - Unit 5 Assignment

    4. Research, Referencing and Critical Writing

    1. The New World

    2. What is VUCA?

    3. A New Paradigm of Management and Leadership in a VUCA World

    4. What is the Great Reset?

    5. The Great Reset: Resetting the World

    6. Risk Management from the Information Security Perspective

    1. Espionage

    2. What Makes Traitors Tick?

    3. Session 2 Summary

    4. Top 10 Most Infamous Cases of Corporate Espionage

    5. Business Counterintelligence as a Protective Strategy for SMEs

    6. Social Engineering - How to Scam Your Way into Anything

    7. A Structured Comparison of Social Engineering Intelligence Gathering Tools

    8. PWC Report E-Espionage

    1. 35 Views of Cyber Risk

    2. 35 Views of Cyber Risk by John Donald

    1. The Fundamentals of Cyber Security

    2. Current and Future Cyber Risks

    3. Cloud Computing Services

    4. Understand Organisational Responses to Cyber Threats

About this course

  • Free
  • 38 lessons
  • 1 hour of video content