
Course overview
A comprehensive journey that helps you navigate uncertainty and make choices aligned with your values and goals.
Module 1 - Getting Started
Start your Cyber Essentials journey by understanding the scheme, the five controls, and how to avoid common mistakes before you begin.
Module 2 - Organisation Details
Set up the organisation details correctly so your application is accurate, eligible, and aligned to what the assessor expects.
Module 3 - Scope, Subsets and Inventory
Define scope properly by deciding what is included, documenting networks and services, and confirming ownership of IT responsibilities.
Module 4 - Firewalls
Work through firewall and internet boundary requirements so you can evidence secure setup, controlled access, and rule management.
Module 5 - Secure Configuration
Implement secure configuration controls by removing insecure defaults and locking down devices, software, and user access settings.
Module 6 - User Access Control
Apply user access control in practice with joiner/mover/leaver processes, strong authentication, and controlled administrator privileges.
Module 7 - Devices and Software
Build and maintain a complete device picture, including approved software and BYOD controls, to support accurate CE answers.
Module 8 - Malware Protection
Choose and operate the right malware protection approach for your environment, then gather evidence to support your CE submission.
Module 9 - Security Update Management
Meet security update requirements by owning patching, tracking software status, and handling unsupported systems safely.
Module 10 - Final Readiness and Submission
Bring everything together for submission by closing gaps, validating evidence, and planning ongoing Cyber Essentials recertification.