631 320 0217
Every organization is responsible for ensuring cyber security . The ability to protect its information systems from impairment, or even theft, is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.
Course Outline
INTRODUCTION
Course Objectives
MODULE 1
Cyber Security Fundamentals
What is Cyberspace?
What is Cyber Security?
Why is Cyber Security Important?
What is a Hacker?
Knowledge Check
MODULE 2
Types of Malware
Worms
Viruses
Spyware
Trojans
Knowledge Check
MODULE 3
Cyber Security Breaches
Phishing
Identity Theft
Harassment
Cyber Stalking
Knowledge Check
MODULE 4
Types of Cyber Attacks
Password Attacks
Denial of Service Attacks
Passive Attacks
Penetration Testing
Knowledge Check
MODULE 5
Prevention Tips
Craft a Strong Password
Two-Step Verification
Download Attachments With Care
Question Legitimacy of Websites
Knowledge Check
MODULE 6
Mobile Protection
No Credit Card Numbers
Place Lock on Phone
Don't Save Passwords
No Personalized Contacts Listed
Knowledge Check
MODULE 7
Social Network Security
Don't Reveal Location
Keep Birthdate Hidden
Have Private Profile
Don't Link Accounts
Knowledge Check
MODULE 8
Prevention Software
Firewalls
Virtual Private Networks
Anti-Virus & Anti-Spyware
Routine Updates
Knowledge Check
MODULE 9
Critical Cyber Threats
Critical Cyber Threats
Cyber Terrorism
Cyber Warfare
Cyber Espionage
Knowledge Check
MODULE 10
Defense Against Hackers
Cryptography
Digital Forensics
Intrusion Detection
Legal Recourse
Knowledge Check
ASSESSMENT
Post Test
We need your consent to load the translations
We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.