The Cyber Security Awareness Training (C|SCU training program provides students with the necessary knowledge and skills to protect their data and information security.
The Cyber Security Awareness Training (C|SCU training program provides students with the necessary knowledge and skills to protect their data and information security. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats, such as:
Identity theft;
Credit card fraud;
Online banking phishing scams
Viruses and backdoors
Emails hoaxes;
Sex offenders lurking online;
Loss of confidential information;
Hacking attacks;
Social engineering
Course Objectives:
After successfully completing this course, students will be able to:
Understand the need for and importance of data security.
Implement operating system security measures on their computers.
Understand malware and its symptoms.
Make an informed decision about choosing the antivirus that is most relevant to their needs.
Understand the risks associated with different online activities.
Understand why and how to secure web browsers.
Identify safe websites.
Safeguard against the threats associated with online social networking.
Understand how to make their social networking accounts secure.
Understand the threats associated with email communications and how to safeguard against them.
Understand the threats to mobile devices and how to safeguard against them.
Understand the threats associated with cloud accounts and how to safeguard against them.
Make an informed decision about a cloud service provider that fulfills their requirements.
Understand the various types of networks and the threats associated with them.
Configure a home network.
Make their networks secure.
Understand the threats to data and the need for data backups.
Back up and restore data on their computers.
Destroy data permanently.
Course Content
Introduction to Data Security
Data: Digital Building Blocks
Importance of Data in the Information Age
Threats to Data
Data Security
Potential Losses Due to Security Attacks
Implementing Security
Securing Operating Systems
Guidelines to Secure Windows
Guidelines to Secure Mac OS X
Malware and Antivirus
What is malware?
Types of Malware
Symptoms of Malware Infection
Antivirus
Configuring and Using Antivirus Software
How to test if an Antivirus is working
Internet Security
Understanding Web Browser Concepts
Understanding IM Security
Understanding Child Online Safety
Security on Social Networking Sites
Understanding Social Networking Concepts
Understanding Various Social Networking Security Threats
Understanding Facebook Security Settings
Understanding Twitter Security Settings
Securing Email Communications
Understanding Email Security Concepts
Understanding Various Email Security Threats
Understanding Various Email Security Procedures
Securing Mobile Devices
Understanding Mobile Device Security Concepts
Understanding Threats to a Mobile Device
Understanding Various Mobile Security Procedures
Understanding How to Secure iPhone and iPad Devices
Understanding How to Secure Android Devices
Understanding How to Secure Windows Devices
Mobile Security Tools
Securing the Cloud
The Concept of Cloud
How the cloud works
Threats to Cloud Security
Safeguarding Against Cloud Security Threats
Cloud Privacy Issues
Addressing Cloud Privacy Issues
Choosing a Cloud Service Provider
Securing Network Connections
Understanding Various Network Concepts
Understanding Setting Up a Wireless Network in Windows
Understanding Setting Up a Wireless Network in Mac
Understanding Threats to Wireless Network Security and Countermeasures
Measures to Secure Network Connections
Data Backup and Disaster
Data Backup Concepts
Types of Data Backups
Windows Backup and Restore Procedures
Mac OS X Backup and Restore Procedures
Understanding Secure Data Destruction
The importance of job skills acquisition has been on the rise globally. From high tech advanced expertise to competencies in established trades, learners are always seeking industry practitioners to learn from.
However, industry practitioners are often too busy to deal with the administration and logistics of training, which inhibits them from giving their knowledge even if they love to.This is where we come in to break down the barrier.
How do we enable training providers for learners?
Courses
We are always on the lookout for industry practitioners who have practical industry knowledge. Whether they already have ready courses or use our trained curriculum writers to transform their knowledge into courses, we seek to bring these knowledge to learners.
Learners
Via the online course portal coursemology.sg, we make it easy for learners to find the course they need to acquire job skills. This also removes training providers’ burden of creating and maintaining web presence for their courses to reach learners online.
Training Facilities
Via Olympus Learning Academy and MSO, we maintain training facilities across Singapore to make it easy for learners to find a class near their home.
Our logistic operators set up the classrooms as required by training providers for each vocational training, be it information technology, security, makeup classes etc.
Customer Service
Via Olympus Learning Academy and MSO, we have trained customer service representatives to engage and educate our learners about the courses to take for their desired skills acquisition.
This eases the communication between learners and training providers.
Class Arrangements
Scheduling and accommodating the time of trainers and tens of students for each class is an administrative headache for training providers and learners.
Skilled executives in Olympus Learning Academy and MSO do this liaison everyday, to the satisfaction of both.
Who we are
Olympus Learning Academy Pte Ltd (OLA) was founded in 2011 as an education training centre. In 2016, OLA pivoted the education business towards marketing adult upgrading and upskilling courses for other training providers.
OLA, together with our partner Coursemology who list our clients’ courses on our Coursemology.sg website, is a one-stop shop solution where we market, provide course information, sales-closures, training facilities, and after-sales support for the training providers.
From Coursemology.sg online course platform to infrastructure and admin support, OLA enables training providers to fill and conduct classes in a conducive environment.
OLA’s training facilities are conveniently located in Toa Payoh Central, Jurong East Central and Tampines Central, all within 5 minutes walking distance from their respective MRT stations.
Lastly, it is important to note that OLA is not a SkillsFuture Approved Training Organisation (ATO). ATOs are OLA’s clients who engage OLA’s premises and services.
In cooperation with OLA, Coursemology.sg was founded 2017. Traditionally, many training providers use word-of-mouth, booths and flyers to reach their intended students.
Coursemology.sg, as an online platform, uses the latest digital marketing to allow training providers to reach their audiences online.
Coursemology.sg generates many enquiries for training providers who have listed their courses with us.
ISACA’s Certified in Risk and Information Systems Control (CRISC®) certification is ideal for mid-career professionals engaged in enterprise risk management and control.
This programme equips participants with the essential knowledge and skills on Cybersecurity Risk Management for Global Supply Chain practices in an organisation.
The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification. CISSP is the premier certification for today’s information systems security professional.
The objective of this 2-day course is to provide an overview of cybersecurity to a broad audience. We will cover foundational topics but will emphasize examples, applications and techniques to raise awareness on the most fundamental cybersecurity concepts, attack vectors and good practices.
Acquire advanced knowledge and skills in cyber security and artificial intelligence, and address the various types of cyber threats using Artificial Intelligence (AI)
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy