Cyber Security Associates Ltd

Cyber eLearning

CSA provides cyber security and data security eLearning courses designed and managed by cyber security experts. Each course provides multiple learning techniques with key facts and tips, and a knowledge test. Access is via on online login. Each course takes between 30-45 mins to complete, with PDF completion certificate.


  • Online access to all courses
  • Easy to use platform
  • Course design by cyber security professionals
  • Courses constantly updated with latest information
  • Students must complete all content before knowledge test
  • Records of course completion and certificates available
  • Courses can be branded and amended as required
  • Discounts for multiple courses
  • Non-technical content that is easy to understand
  • Courses for employees and managers


  • Allows single log-in for multiple courses
  • Clear and simple content that is non-technical


£15 to £25 per unit per quarter

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

6 6 5 0 3 3 3 3 4 5 1 9 8 3 5


Cyber Security Associates Ltd

Cyber Security Associates


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
  • Online access
  • Windows 7 and above and MAC OS X
  • Flash enabled

User support

Email or online ticketing support
Email or online ticketing
Support response times
All support is provided via the CSA Managed Services Platform/Portal.

This is available 24/7 to access, but requests will only be responded to within normal SIOC working hours which are Mon - Fr- 0600-2200hrs.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
The CSA SIOC will act as the support for the eLearning platform. All requests will be directed via the Portal.
Support available to third parties

Onboarding and offboarding

Getting started
CSA will provide user guides and management console set-up via the CSA Management Platform/Portal.
Service documentation
Documentation formats
End-of-contract data extraction
CSA will delete all customer data (email, name and position) 30 days after course completion.
End-of-contract process
End-users will no-longer be able to access their assigned courses 2 months after being registered.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
Customisation available
Description of customisation
Users can re-brand the eLearning courses using access to their own Management Console. In addition, course content can be updated to reflect the clients individual objectives.


Independence of resources
Once enrollment has been completed, minimal resource is required to support.

The CSA SIOC will provide the support required.


Service usage metrics
Metrics types
Through the CSA Management Console users can access course usage metrics. These include date of enrollment, time spent on course, results and number of attempts at test.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export course data via the CSA Management Portal.

End-users can export certificates of completion.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
AES 256 encryption
Data protection within supplier network
Other protection within supplier network
AES 256 encryption

Availability and resilience

Guaranteed availability
CSA provides 99% availability to the eLearning platform, provided the user has access to the Internet.
Approach to resilience
CSA provides hot-site back-up.
Outage reporting
This is through the CSA Managed Dashboard/Portal.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Unique username and password over HTTPS.

In addition, individual public IPs used for each customer.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
CSA is fully aligned to ISO 27001:2013 and has a fully documented Information Security Management System. In addition it has the Cyber Essentials certification.
Information security policies and processes
CSA has a fully documented Information Security Management that is fully aligned and managed in accordance with ISO 27001:2013

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
CSA has an established change management process and change advisory board chaired by CSA Director Operations.

All changes are developed in a test environment before deployment into production.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
CSA has its own cyber intelligence capability that assesses threats and vulnerabilities.

Vendor patches applied automatically.

CSA member of CiSP
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
CSA has its own protective monitoring capability deployed throughout its infrastructure.
Incident management type
Supplier-defined controls
Incident management approach
CSA uses its own security operating centre for incident response.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£15 to £25 per unit per quarter
Discount for educational organisations
Free trial available
Description of free trial
Access to limited number of slides and content is available on request.

Service documents

Return to top ↑