Cyber Security
Module 1:
- Getting Started
- Workshop Objectives
Module 2:
- Why Your Office Needs Administrative Procedures
- What is Cyberspace?
- What is Cyber Security?
- Why is Cyber Security Important?
- What is a Hacker?
- Case Study
Module 3:
- Types of Malware
- Worms
- Viruses
- Spyware
- Trojans
- Case Study
Module 4:
- Cyber Security Breaches
- Phishing
- Identify Theft
- Harassments
- Cyber Stalking
- Case Study
Module 5:
- Types of Cyber Attacks
- Password Attacks
- Denial of Service Attacks
- Passive Attack
- Penetration Testing
- Case Study
Module 6:
- Prevention Tips
- Craft a Strong Password
- Two-Step Verification
- Download Attachments with Care
- Question Legitimacy of Websites
- Case Study
Module 7:
- Mobile Protection
- No Credit Card Numbers
- Place Lock on Phone
- Don’t Save Passwords
- No Personalized Contacts Listed
- Case Study
Module 8:
- Social Network Security
- Don’t Reveal Location
- Keep Birthdate Hidden
- Have Private Profile
- Don’t Link Accounts
- Case Study
Module 9:
- Prevention Software
- Firewalls
- Virtual Private Networks
- Anti-Virus and Anti-Spyware
- Routine Updates
- Case Study
Module 10:
- Critical Cyber Threats
- Critical Cyber Threats
- Cyber Terrorism
- Cyber Warfare
- Cyber Espionage
- Case Study
Module 11:
- Defense Against Hackers
- Cryptography
- Digital Forensics
- Intrusion Detection
- Legal Resource
- Case Study
Module 12:
- Wrapping Up
Be the first to add a review.
Please, login to leave a review