Cyber Security

Module 1:

  • Getting Started
  • Workshop Objectives

Module 2:

  • Why Your Office Needs Administrative Procedures
  • What is Cyberspace?
  • What is Cyber Security?
  • Why is Cyber Security Important?
  • What is a Hacker?
  • Case Study

Module 3:

  • Types of Malware
  • Worms
  • Viruses
  • Spyware
  • Trojans
  • Case Study

Module 4:

  • Cyber Security Breaches
  • Phishing
  • Identify Theft
  • Harassments
  • Cyber Stalking
  • Case Study

Module 5:

  • Types of Cyber Attacks
  • Password Attacks
  • Denial of Service Attacks
  • Passive Attack
  • Penetration Testing
  • Case Study

Module 6:

  • Prevention Tips
  • Craft a Strong Password
  • Two-Step Verification
  • Download Attachments with Care
  • Question Legitimacy of Websites
  • Case Study

Module 7:

  • Mobile Protection
  • No Credit Card Numbers
  • Place Lock on Phone
  • Don’t Save Passwords
  • No Personalized Contacts Listed
  • Case Study

Module 8:

  • Social Network Security
  • Don’t Reveal Location
  • Keep Birthdate Hidden
  • Have Private Profile
  • Don’t Link Accounts
  • Case Study

Module 9:

  • Prevention Software
  • Firewalls
  • Virtual Private Networks
  • Anti-Virus and Anti-Spyware
  • Routine Updates
  • Case Study

Module 10:

  • Critical Cyber Threats
  • Critical Cyber Threats
  • Cyber Terrorism
  • Cyber Warfare
  • Cyber Espionage
  • Case Study

Module 11:

  • Defense Against Hackers
  • Cryptography
  • Digital Forensics
  • Intrusion Detection
  • Legal Resource
  • Case Study

Module 12:

  • Wrapping Up

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 1 student
Lectures: 6