Cybersecurity

by GRC Solutions Claim Listing

This course surveys the most common information security issues and challenges, including direct observation, malware viruses, phishing, identity theft, spam and credit card skimming. It explores how mobile devices such as laptops and phones are vulnerable to theft.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

GRC Solutions Logo

img Duration

Please Enquire

Course Details

Everyone in the workplace has a role to play in responding to information security issues and challenges. The first step in reducing the risk of data breaches is to learn what they are and be aware of how they typically occur, so that appropriate measures can be taken to prevent them from taking place in the future.

This course surveys the most common information security issues and challenges, including direct observation, malware viruses, phishing, identity theft, spam and credit card skimming. It explores how mobile devices such as laptops and phones are vulnerable to theft. 

It also considers the Cybersecurity risks associated with working remotely, as well as the personal and professional issues associated with online activities such as using social media or storing information in the cloud. Each topic is explored in plain English, followed by a clear explanation of simple strategies for data protection.

 

Who is this training for?

This course is suitable for everyone responsible for handling information in the workplace, whether they are at work, at home or offsite.

 

Course Outline:

Module 1: Introduction
Module 2: Protecting Work Information
Module 3: Data security while working from home, in the office, and offsite

  • Central Branch

    Level 14-01, 1 Wallich Street, Central

Check out more Cybersecurity courses in Singapore

Stag Match Institute Logo

Cyber Security Program

Cybersecurity professionals are always busy outsmarting black hat hackers, patching vulnerabilities and analyzing the risk of an organization.

by Stag Match Institute [Claim Listing ]
Koenig-Solutions Logo

Certified Information Security Manager (CISM)

The Certified Information Security Manager (CISM) is a globally recognized certification that validates an individual's knowledge, expertise, and skills in managing, designing, and assessing an organization's information security.

by Koenig-Solutions [Claim Listing ]
  • Price
  • Start Date
  • Duration
COMAT Logo

CISSP - Certified Information Systems Security Professional

For individuals in the field of information security, the CISSP credential will render the recognition of their expertise and skills. The globally recognised standard is ideal for experienced information security professionals, including those in mid and senior level managerial positions.

by COMAT [Claim Listing ]
The IT Enabling Company Logo

Information Systems Security (SF) (CISSP)

This 5-day cyber security course (CISSP) backed by (ISC²)will expand upon your knowledge addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.

by The IT Enabling Company [Claim Listing ]
COMAT Logo

Introduction to Cybersecurity

This course addresses the knowledge and skills that enable learners to administer, configure and update of security programmes and mechanisms, including the application of system patches to ensure that personal and/or enterprise assets are adequately protected against threats.

by COMAT [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy