Cyber Security 2 Days Training in Seoul
Course Overview Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity. With our Cyber Security workshop your participants will understand the different types of malware and security breaches. Develop effective prevention methods which will increase overall security. They will also understand the basic concepts associated with Cyber Security and what a company needs to stay secure. Target Audience: There is no Eligibility Criteria for this training, anyone can attend this training Prerequisites: There are no prerequisites for this course. Course Materials: Students will receive a course manual with presentation slides and reference materials. Examination: No Exam Technical Requirements: For eBooks: Internet for downloading the eBook Laptop, tablet, Smartphone, eReader (No Kindle) Adobe DRM supported software (e.g. Digital Editions, Bluefire Reader) eBook download and activation instructions Agenda: Module One: Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Module Two: Cyber security Fundamentals What is Cyberspace? What is Cyber security? Why is Cyber security Important? What is a Hacker? Case Study Module Two: Review Questions Module Three: Types of Malware Worms Viruses Spyware Trojans Case Study Module Three: Review Questions Module Four: Cyber Security Breaches Phishing Identity Theft Harassment Cyberstalking Case Study Module Four: Review Questions Module Five: Types of Cyber Attacks Password Attacks Denial of Service Attacks Passive Attack Penetration Testing Case Study Module Five: Review Questions Module Six: Prevention Tips Craft a Strong Password Two-Step Verification Download Attachments with Care Question Legitimacy of Websites Case Study Module Six: Review Questions Module Seven: Mobile Protection No Credit Card Numbers Place Lock on Phone Don’t Save Passwords No Personalized Contacts Listed Case Study Module Seven: Review Questions Module Eight: Social Network Security Don’t Reveal Location Keep Birthdate Hidden Have Private Profile Don’t Link Accounts Case Study Module Eight: Review Questions Module Nine: Prevention Software Firewalls Virtual Private Networks Anti-Virus & Anti-Spyware Routine Updates Case Study Module Nine: Review Questions Module Ten: Critical Cyber Threats Critical Cyber Threats Cyber terrorism Cyberwarfare Cyberespionage Case Study Module Ten: Review Questions Module Eleven: Defense Against Hackers Cryptography Digital Forensics Intrusion Detection Legal Recourse Case Study Module Eleven: Review Questions Module Twelve: Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations
read more