Course Outline


  • Overview of Cyber Security
  • Importance of Cyber Security
  • Overview of the different hacking techniques

Social Engineering

  • Impersonation and fraud
  • Non-technical social engineering
  • Reverse social engineering
  • Shoulder surfing
  • Dumpster diving
  • Eavesdropping


  • Identifying a phishing email
  • Deceptive phishing
  • Spear phishing
  • Whaling phishing
  • Phone phishing

Internet Security

  • Staying safe while using the internet
  • Using the internet through Safe Network
  • Sharing data outside the network
  • Data leakage prevention and monitoring systems
  • Wi-Fi phishing attacks
  • Using public WiFi Networks
  • Browsing non-HTTPS websites
  • Installing software from untrusted sources
  • Key loggers
  • Mobile security
  • Cloud computing security

Email Security

  • Recommendations for email security
  • Wrong email recipients
  • Ignoring the unknown recipients
  • Malware over email

Password Security

  • Revealing passwords over the phone
  • Remember my password on a public computer
  • Writing password down
  • Selecting an easy password
  • Locking your computer
  • Hacking the one-time password
  • Selecting a strong password

Organization Policies

  • General Data Protection Regulation (GDPR)
  • Acceptable use policy
  • Clearing disk
  • Locking the office
  • Monitoring positions
  • Bringing own device
  • Travel security
  • Mobile security awareness

Cyber Security for Remote Workers

  • Cyber security risks for remote workers
  • Remote working security
  • Best practices for remote workers

Cyber Security for Secure Coding

  • Overview of secure coding
  • Best practices for secure coding

IT Security Best Practices

  • Importance of IT security
  • IT industry Cyber Security best practices

Summary and Next Steps


Basic Computer knowledge

  7 Hours


Related Courses

CEH - Certified Ethical Hacker v12

  35 hours

Certified Chief Information Security Officer (CCISO)

  35 hours


  21 hours

Open Source Cyber Intelligence - Introduction

  7 hours

Open Source Intelligence (OSINT) Advanced

  21 hours

Fundamentals of Corporate Cyber Warfare

  14 hours

Certificate of Cloud Security Knowledge

  14 hours

Microsoft SDL Core

  14 hours

C/C++ Secure Coding

  21 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours