Course Outline

Introduction

  • Overview of Cyber Security
  • Importance of Cyber Security
  • Overview of the different hacking techniques

Social Engineering

  • Impersonation and fraud
  • Non-technical social engineering
  • Reverse social engineering
  • Shoulder surfing
  • Dumpster diving
  • Eavesdropping

Phishing

  • Identifying a phishing email
  • Deceptive phishing
  • Spear phishing
  • Whaling phishing
  • Phone phishing

Internet Security

  • Staying safe while using the internet
  • Using the internet through Safe Network
  • Sharing data outside the network
  • Data leakage prevention and monitoring systems
  • Wi-Fi phishing attacks
  • Using public WiFi Networks
  • Browsing non-HTTPS websites
  • Installing software from untrusted sources
  • Key loggers
  • Mobile security
  • Cloud computing security

Email Security

  • Recommendations for email security
  • Wrong email recipients
  • Ignoring the unknown recipients
  • Malware over email

Password Security

  • Revealing passwords over the phone
  • Remember my password on a public computer
  • Writing password down
  • Selecting an easy password
  • Locking your computer
  • Hacking the one-time password
  • Selecting a strong password

Organization Policies

  • General Data Protection Regulation (GDPR)
  • Acceptable use policy
  • Clearing disk
  • Locking the office
  • Monitoring positions
  • Bringing own device
  • Travel security
  • Mobile security awareness

Cyber Security for Remote Workers

  • Cyber security risks for remote workers
  • Remote working security
  • Best practices for remote workers

Cyber Security for Secure Coding

  • Overview of secure coding
  • Best practices for secure coding

IT Security Best Practices

  • Importance of IT security
  • IT industry Cyber Security best practices

Summary and Next Steps

Requirements

Basic Computer knowledge

 7 Hours

Number of participants



Price per participant

Testimonials (2)

Related Courses

CRISC - Certified in Risk and Information Systems Control

21 Hours

CRISC - Certified in Risk and Information Systems Control - 4 Days

28 Hours

IBM Qradar SIEM: Beginner to Advanced

14 Hours

Certified Chief Information Security Officer (CCISO)

35 Hours

CEH - Certified Ethical Hacker v12

35 Hours

Certified Penetration Testing Professional - CPENT

35 Hours

EC-COUNCIL CERTIFIED INCIDENT HANDLER (ECIH)

21 Hours

Incident Response

21 Hours

Threat Hunting

21 Hours

Open Source Intelligence (OSINT) Advanced

21 Hours

Open Source Cyber Intelligence - Introduction

7 Hours

Fundamentals of Corporate Cyber Warfare

14 Hours

Certificate of Cloud Security Knowledge

14 Hours

Application Security for Developers

21 Hours

Android Security

14 Hours

Related Categories