Get in Touch

Course Outline

Introduction

  • Overview of Cyber Security
  • Importance of Cyber Security
  • Overview of various hacking techniques

Social Engineering

  • Impersonation and fraud
  • Non-technical social engineering
  • Reverse social engineering
  • Shoulder surfing
  • Dumpster diving
  • Eavesdropping

Phishing

  • Identifying a phishing email
  • Deceptive phishing
  • Spear phishing
  • Whaling phishing
  • Phone phishing

Internet Security

  • Staying safe while using the internet
  • Using the internet through a Safe Network
  • Sharing data outside the network
  • Data leakage prevention and monitoring systems
  • Wi-Fi phishing attacks
  • Using public WiFi Networks
  • Browsing non-HTTPS websites
  • Installing software from untrusted sources
  • Key loggers
  • Mobile security
  • Cloud computing security

Email Security

  • Recommendations for email security
  • Mistakenly sending emails to wrong recipients
  • Handling unknown recipients
  • Malware transmitted via email

Password Security

  • Revealing passwords over the phone
  • Enabling 'Remember my password' on public computers
  • Writing passwords down
  • Selecting an easy password
  • Failing to lock your computer
  • Targeting one-time passwords
  • Selecting a strong password

Organization Policies

  • General Data Protection Regulation (GDPR)
  • Acceptable use policy
  • Properly clearing disks
  • Locking the office
  • Monitoring positions
  • Bringing your own device
  • Travel security
  • Mobile security awareness

Cyber Security for Remote Workers

  • Cyber security risks for remote workers
  • Remote working security
  • Best practices for remote workers

Cyber Security for Secure Coding

  • Overview of secure coding
  • Best practices for secure coding

IT Security Best Practices

  • Importance of IT security
  • IT industry Cyber Security best practices

Summary and Next Steps

Requirements

Basic computer knowledge

 7 Hours

Testimonials (7)

Upcoming Courses

Related Categories