Course Synopsis

Every organization is responsible for ensuring cybersecurity. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity. With our “Cybersecurity” workshop, you will discover the fundamentals of cybersecurity as well as the methods that should be implemented to make sure their computer systems are protected.

 

Course Objectives

  • Understand different types of malware and security breaches
  • Know the types of cyber attacks to look out for
  • Develop effective prevention methods

Course curriculum

  • 1

    Getting Started

    • Module 1 - Introduction

    • Module 1 - Getting Started

    • Module 1 - Workshop Objectives

  • 2

    Cybersecurity Fundamentals

    • Module 2 - Cybersecurity Fundamentals

    • Module 2 - What is Cybersecurity?

    • Module 2 - What is Cyberspace?

    • Module 2 - Why is Cybersecurity Important?

    • Module 2 - What is a Hacker?

    • Module 2 - Case Study

    • Module 2 - Video

    • Module 2 - Quiz

  • 3

    Types of Malware

    • Module 3 - Types of Malware

    • Module 3 - Worms

    • Module 3 - Viruses

    • Module 3 - Spyware

    • Module 3 - Trojans

    • Module 3 - Case Study

    • Module 3 - Video

    • Module 3 - Quiz

  • 4

    Cyber Security Breaches

    • Module 4 - Cyber Security Breaches

    • Module 4 - Phishing

    • Module 4 - Identity Theft

    • Module 4 - Harassment

    • Module 4 - Cyberstalking

    • Module 4 - Case Study

    • Module 4 - Video

    • Module 4 - Quiz

  • 5

    Types of Cyber Security

    • Module 5 - Types of Cyberattacks

    • Module 5 - Password Attacks

    • Module 5 - Denial of Service Attack

    • Module 5 - Passive Attack

    • Module 5 - Penetration Testing

    • Module 5 - Case Study

    • Module 5 - Video

    • Module 5 - Quiz

  • 6

    Prevention Tips

    • Module 6 - Prevention Tips

    • Module 6 - Crafting a Strong Password

    • Module 6 - Two Step Verification

    • Module 6 - Download Attachments With Care

    • Module 6 - Questioning Legitimacy of Websites

    • Module 6 - Case Study

    • Module 6 - Video

    • Module 6 - Quiz

  • 7

    Mobile Protection

    • Module 7 - Mobile Protection

    • Module 7 - No Credit Card Numbers

    • Module 7 - Place Lock on Phone

    • Module 7 - Don't Save Passwords

    • Module 7 - No Personalized Contacts Listed

    • Module 7 - Case Study

    • Module 7 - Video

    • Module 7 - Quiz

  • 8

    Social Network Security

    • Module 8 - Social Networking Security

    • Module 8 - Don't Reveal Location

    • Module 8 - Keep Birthdate Hidden

    • Module 8 - Have Private Profile

    • Module 8 - Don't Link Accounts

    • Module 8 - Case Study

    • Module 8 - Video

    • Module 8 - Quiz

  • 9

    Prevention Software

    • Module 9 - Prevention Software

    • Module 9 - Firewalls

    • Module 9 - VIrtual Private Networks

    • Module 9 - Anti-Virus & Anti-Spyware

    • Module 9 - Routine Updates

    • Module 9 - Case Study

    • Module 9 - Video

    • Module 9 - Quiz

  • 10

    Critical Cyber Threats

    • Module 10 - Critical Cyber Threats

    • Module 10 - Critical Cyber Threats

    • Mdoule 10 - Cyberterrorism

    • Module 10 - Cyberwarfare

    • Module 10 - Cyberespionage

    • Module 10 - Case Study

    • Module 10 - Video

    • Module 10 - Quiz

  • 11

    Defense Against Hackers

    • Module 11 - Defense Againt Hackers

    • Module 11 - Cryptography

    • Module 11 - Digital Forensics

    • Module 11 - Intrusion Detection

    • Module 11 - Case Study

    • Module 11 - Video

    • Module 11 - Quiz

  • 12

    Wrapping Up

    • Module 12 - Wrapping Up

Cyber Security