Every organization is responsible for ensuring cyber security . The ability to protect its information systems from impairment, or even theft, is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.

 

Course Outline

 

INTRODUCTION
Course Objectives


MODULE 1
Cyber Security Fundamentals
What is Cyberspace?
What is Cyber Security?
Why is Cyber Security Important?
What is a Hacker?
Knowledge Check


MODULE 2
Types of Malware
Worms
Viruses
Spyware
Trojans
Knowledge Check


MODULE 3
Cyber Security Breaches
Phishing
Identity Theft
Harassment
Cyber Stalking
Knowledge Check


MODULE 4
Types of Cyber Attacks
Password Attacks
Denial of Service Attacks
Passive Attacks
Penetration Testing
Knowledge Check


MODULE 5
Prevention Tips
Craft a Strong Password
Two-Step Verification
Download Attachments With Care
Question Legitimacy of Websites
Knowledge Check


MODULE 6
Mobile Protection
No Credit Card Numbers
Place Lock on Phone
Don't Save Passwords
No Personalized Contacts Listed
Knowledge Check


MODULE 7
Social Network Security
Don't Reveal Location
Keep Birthdate Hidden
Have Private Profile
Don't Link Accounts
Knowledge Check


MODULE 8
Prevention Software
Firewalls
Virtual Private Networks
Anti-Virus & Anti-Spyware
Routine Updates
Knowledge Check


MODULE 9
Critical Cyber Threats
Critical Cyber Threats
Cyber Terrorism
Cyber Warfare
Cyber Espionage
Knowledge Check


MODULE 10
Defense Against Hackers
Cryptography
Digital Forensics
Intrusion Detection
Legal Recourse
Knowledge Check


ASSESSMENT
Post Test
 

Logo

© Copyright. All rights reserved.

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.