Description
Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.
With our Cyber Security workshop your participants will understand the different types of malware and security breaches. Develop effective prevention methods which will increase overall security. They will also understand the basic concepts associated with Cyber Security and what a company needs to stay secure.
Cyber Security Outline:
| 
| Module One: Getting Started 
IcebreakerHousekeeping ItemsThe Parking LotWorkshop Objectives Module Two: Cyber security Fundamentals 
What is Cyberspace?What is Cyber security?Why is Cyber security Important?What is a Hacker?Case StudyModule Two: Review Questions Module Three: Types of Malware 
WormsVirusesSpywareTrojansCase StudyModule Three: Review Questions Module Four: Cyber Security Breaches 
PhishingIdentity TheftHarassmentCyberstalkingCase StudyModule Four: Review Questions Module Five: Types of Cyber Attacks 
Password AttacksDenial of Service AttacksPassive AttackPenetration TestingCase StudyModule Five: Review Questions Module Six: Prevention Tips 
Craft a Strong PasswordTwo-Step VerificationDownload Attachments with CareQuestion Legitimacy of WebsitesCase StudyModule Six: Review Questions | Module Seven: Mobile Protection 
No Credit Card NumbersPlace Lock on PhoneDon’t Save PasswordsNo Personalized Contacts ListedCase StudyModule Seven: Review Questions Module Eight: Social Network Security 
Don’t Reveal LocationKeep Birthdate HiddenHave Private ProfileDon’t Link AccountsCase StudyModule Eight: Review Questions Module Nine: Prevention Software 
FirewallsVirtual Private NetworksAnti-Virus & Anti-SpywareRoutine UpdatesCase StudyModule Nine: Review Questions Module Ten: Critical Cyber Threats 
Critical Cyber ThreatsCyber terrorism Cyberwarfare 
CyberespionageCase StudyModule Ten: Review Questions Module Eleven: Defense Against Hackers 
CryptographyDigital ForensicsIntrusion DetectionLegal RecourseCase StudyModule Eleven: Review Questions Module Twelve: Wrapping Up 
Words from the WiseReview of Parking LotLessons LearnedCompletion of Action Plans and Evaluations |  |