Cyber Security

Description

Every organization is responsible for ensuring cybersecurity. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.

With our “Cybersecurity” course, you will discover the fundamentals of cybersecurity as well as the methods that should be implemented to make sure that your computer systems are protected.

Course Curriculum

  • Introduction
    • Course Objectives ..
  • Module 1
    • Cyber Security Fundamentals ..
    • What is Cyberspace? ..
    • What is Cyber Security? ..
    • Why is Cyber Security Important? ..
    • What is a Hacker? ..
    • Knowledge Check ..
  • Module 2
    • Types of Malware ..
    • Worms ..
    • Viruses ..
    • Spyware ..
    • Trojans ..
    • Knowledge Check ..
  • Module 3
    • Cyber Security Breaches ..
    • Phishing ..
    • Identity Theft ..
    • Harassment ..
    • Cyber Stalking ..
    • Knowledge Check ..
  • Module 4
    • Types of Cyber Attacks ..
    • Password Attacks ..
    • Denial of Service Attacks ..
    • Passive Attacks ..
    • Penetration Testing ..
    • Knowledge Check ..
  • Module 5
    • Prevention Tips ..
    • Craft a Strong Password ..
    • Two-Step Verification ..
    • Download Attachments With Care ..
    • Question Legitimacy of Websites ..
    • Knowledge Check ..
  • Module 6
    • Mobile Protection ..
    • No Credit Card Numbers ..
    • Place Lock on Phone ..
    • Don't Save Passwords ..
    • No Personalized Contacts Listed ..
    • Knowledge Check ..
  • Module 7
    • Social Network Security ..
    • Don't Reveal Location ..
    • Keep Birthdate Hidden ..
    • Have Private Profile ..
    • Don't Link Accounts ..
    • Knowledge Check ..
  • Module 8
    • Prevention Software ..
    • Firewalls ..
    • Virtual Private Networks ..
    • Anti-Virus & Anti-Spyware ..
    • Routine Updates ..
    • Knowledge Check ..
  • Module 9
    • Critical Cyber Threats ..
    • Critical Cyber Threats ..
    • Cyber Terrorism ..
    • Cyber Warfare ..
    • Cyber Espionage ..
    • Knowledge Check ..
  • Module 10
    • Defense Against Hackers ..
    • Cryptography ..
    • Digital Forensics ..
    • Intrusion Detection ..
    • Legal Recourse ..
    • Knowledge Check ..
  • Assessment
    • Post Test ..