Cyber Security Awareness
Cybersecurity encompasses the strategic implementation of various tools, measures, and protocols to safeguard networks, computers, programs, devices, and data from unauthorized digital assaults.
Course Outlines
Introduction
- Overview of Cyber Security
- Importance of Cyber Security
- Overview of the different hacking techniques
Social Engineering
- Impersonation and fraud
- Non-technical social engineering
- Reverse social engineering
- Shoulder surfing
- Dumpster diving
- Eavesdropping
Phishing
- Identifying a phishing email
- Deceptive phishing
- Spear phishing
- Whaling phishing
- Phone phishing
Internet Security
- Staying safe while using the internet
- Using the internet through Safe Network
- Sharing data outside the network
- Data leakage prevention and monitoring systems
- Wi-Fi phishing attacks
- Using public WiFi Networks
- Browsing non-HTTPS websites
- Installing software from untrusted sources
- Key loggers
- Mobile security
- Cloud computing security
Email Security
- Recommendations for email security
- Wrong email recipients
- Ignoring the unknown recipients
- Malware over email
Password Security
- Revealing passwords over the phone
- Remember my password on a public computer
- Writing password down
- Selecting an easy password
- Locking your computer
- Hacking the one-time password
- Selecting a strong password
Organization Policies
- General Data Protection Regulation (GDPR)
- Acceptable use policy
- Clearing disk
- Locking the office
Monitoring positions
- Bringing own device
- Travel security
- Mobile security awareness
Cyber Security for Remote Workers
- Cyber security risks for remote workers
- Remote working security
- Best practices for remote workers
Cyber Security for Secure Coding
- Overview of secure coding
- Best practices for secure coding
IT Security Best Practices
- Importance of IT security
- IT industry Cyber Security best practices
Summary and Next Steps towards learning advanced Cyber Security
Requirements
Basic Computer knowledge