Thank you for sending your enquiry! One of our team member will contact you shortly.
Thank you for sending your booking! One of our team member will contact you shortly.
Course Outline
Introduction
- Overview of Cyber Security
- Importance of Cyber Security
- Overview of the different hacking techniques
Social Engineering
- Impersonation and fraud
- Non-technical social engineering
- Reverse social engineering
- Shoulder surfing
- Dumpster diving
- Eavesdropping
Phishing
- Identifying a phishing email
- Deceptive phishing
- Spear phishing
- Whaling phishing
- Phone phishing
Internet Security
- Staying safe while using the internet
- Using the internet through Safe Network
- Sharing data outside the network
- Data leakage prevention and monitoring systems
- Wi-Fi phishing attacks
- Using public WiFi Networks
- Browsing non-HTTPS websites
- Installing software from untrusted sources
- Key loggers
- Mobile security
- Cloud computing security
Email Security
- Recommendations for email security
- Wrong email recipients
- Ignoring the unknown recipients
- Malware over email
Password Security
- Revealing passwords over the phone
- Remember my password on a public computer
- Writing password down
- Selecting an easy password
- Locking your computer
- Hacking the one-time password
- Selecting a strong password
Organization Policies
- General Data Protection Regulation (GDPR)
- Acceptable use policy
- Clearing disk
- Locking the office
- Monitoring positions
- Bringing own device
- Travel security
- Mobile security awareness
Cyber Security for Remote Workers
- Cyber security risks for remote workers
- Remote working security
- Best practices for remote workers
Cyber Security for Secure Coding
- Overview of secure coding
- Best practices for secure coding
IT Security Best Practices
- Importance of IT security
- IT industry Cyber Security best practices
Summary and Next Steps
Requirements
Basic Computer knowledge
Testimonials
How well spoken it all was
Natalie Gill, The Growth Company
Cyber Security Awareness Training Course
I enjoyed the whole training session, very handy for a potential new career option, which i have been considering.
Christopher Crompton - Natalie Gill, The Growth Company
Cyber Security Awareness Training Course
I enjoyed the whole training session, very handy for a potential new career option, which i have been considering.
Christopher Crompton - Natalie Gill, The Growth Company
Cyber Security Awareness Training Course
Related Courses
CEH - Certified Ethical Hacker v12
35 hours
Incident Response
21 hours
Threat Hunting
21 hours
Microsoft SDL Core
14 hours
C/C++ Secure Coding
21 hours
Standard Java Security
14 hours
Java and Web Application Security
21 hours
Advanced Java Security
21 hours