Cyber Security Awareness Training

by Coursemology Claim Listing

The Cyber Security Awareness Training (C|SCU training program provides students with the necessary knowledge and skills to protect their data and information security.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Coursemology Logo

img Duration

1 Day

Course Details

The Cyber Security Awareness Training (C|SCU training program provides students with the necessary knowledge and skills to protect their data and information security. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats, such as:

  • Identity theft;

  • Credit card fraud;

  • Online banking phishing scams

  • Viruses and backdoors

  • Emails hoaxes;

  • Sex offenders lurking online;

  • Loss of confidential information;

  • Hacking attacks;

  • Social engineering

 

Course Objectives:

  • After successfully completing this course, students will be able to:

  • Understand the need for and importance of data security.

  • Implement operating system security measures on their computers.

  • Understand malware and its symptoms.

  • Make an informed decision about choosing the antivirus that is most relevant to their needs.

  • Understand the risks associated with different online activities.

  • Understand why and how to secure web browsers.

  • Identify safe websites.

  • Safeguard against the threats associated with online social networking.

  • Understand how to make their social networking accounts secure.

  • Understand the threats associated with email communications and how to safeguard against them.

  • Understand the threats to mobile devices and how to safeguard against them.

  • Understand the threats associated with cloud accounts and how to safeguard against them.

  • Make an informed decision about a cloud service provider that fulfills their requirements.

  • Understand the various types of networks and the threats associated with them.

  • Configure a home network.

  • Make their networks secure.

  • Understand the threats to data and the need for data backups.

  • Back up and restore data on their computers.

  • Destroy data permanently.

 

Course Content

  • Introduction to Data Security

  • Data: Digital Building Blocks

  • Importance of Data in the Information Age

  • Threats to Data

  • Data Security

  • Potential Losses Due to Security Attacks

  • Implementing Security

  • Securing Operating Systems

  • Guidelines to Secure Windows

  • Guidelines to Secure Mac OS X

  • Malware and Antivirus

  • What is malware?

  • Types of Malware

  • Symptoms of Malware Infection

  • Antivirus

  • Configuring and Using Antivirus Software

  • How to test if an Antivirus is working

  • Internet Security

  • Understanding Web Browser Concepts

  • Understanding IM Security

  • Understanding Child Online Safety

  • Security on Social Networking Sites

  • Understanding Social Networking Concepts

  • Understanding Various Social Networking Security Threats

  • Understanding Facebook Security Settings

  • Understanding Twitter Security Settings

  • Securing Email Communications

  • Understanding Email Security Concepts

  • Understanding Various Email Security Threats

  • Understanding Various Email Security Procedures

  • Securing Mobile Devices

  • Understanding Mobile Device Security Concepts

  • Understanding Threats to a Mobile Device

  • Understanding Various Mobile Security Procedures

  • Understanding How to Secure iPhone and iPad Devices

  • Understanding How to Secure Android Devices

  • Understanding How to Secure Windows Devices

  • Mobile Security Tools

  • Securing the Cloud

  • The Concept of Cloud

  • How the cloud works

  • Threats to Cloud Security

  • Safeguarding Against Cloud Security Threats

  • Cloud Privacy Issues

  • Addressing Cloud Privacy Issues

  • Choosing a Cloud Service Provider

  • Securing Network Connections

  • Understanding Various Network Concepts

  • Understanding Setting Up a Wireless Network in Windows

  • Understanding Setting Up a Wireless Network in Mac

  • Understanding Threats to Wireless Network Security and Countermeasures

  • Measures to Secure Network Connections

  • Data Backup and Disaster

  • Data Backup Concepts

  • Types of Data Backups

  • Windows Backup and Restore Procedures

  • Mac OS X Backup and Restore Procedures

  • Understanding Secure Data Destruction

  • East Branch

    300 Tampines Avenue 5, East
  • Central Branch

    Blk 190 Toa Payoh Lorong 6, Central
  • West Branch

    2 Venture Drive Vision Exchange,, West

Check out more Cybersecurity courses in Singapore

Sapience Consulting Pte Ltd Logo

Certified Information Security Manager (CISM)

A 4-day CISM exam preparation course, designed to help those intending to obtain the CISM certification, which is becoming a must-have certification in InfoSecurity.

by Sapience Consulting Pte Ltd [Claim Listing ]
Ccisg Logo

Effective Ways To Mitigate Cybersecurity Attacks

Hackers today get more sophisticated and unpredictable in their persistent attacks and cyber activities. As we move towards a more digitized world, the threats and security risks increases greatly.

by Ccisg [Claim Listing ]
COMAT Logo

Introduction to Cybersecurity

This course addresses the knowledge and skills that enable learners to administer, configure and update of security programmes and mechanisms, including the application of system patches to ensure that personal and/or enterprise assets are adequately protected against threats.

by COMAT [Claim Listing ]
NTUC LearningHub Logo

Certified Information Security Manager® (CISM®) (SF)

Certification holders are consistently recognized among the most-qualified professionals in the information security and risk management fields. CISM holders are also able to promote international security practices.

by NTUC LearningHub [Claim Listing ]
  • Price
  • Start Date
  • Duration
AsiaCloud Logo

Cybersecurity Training

We offer a holistic approach to your employees' Security Awareness with Phished.io ?Awareness alone is never enough. It is important to offer them a complete training that covers every base. These four pillar features can ensure you a complete training. 

by AsiaCloud [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy