Fundamental Of Cyber Security

by Iconic Training Solutions Claim Listing

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Iconic Training Solutions Logo

img Duration

2 Days

Course Details

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

 

Course Objectives:

Upon completion of this program, the participants will be able to:

  • Understand landscape of cyber security around the world

  • Recognize the trends of cyber security

  • Understand standards and legislative requirements with regards to data protection

  • Recognize cyber attacks and other risks

  • Protect and monitor against threats

  • Manage cyber security incidents

  • Develop good cyber security practices for your organization

 

Key Content:

  • Module 1: Landscape Cyber Security

    • What is cyber security?

    • Trends of cyber security

    • Importance of data protection

    • Recent and major data breaches

  • Module 2: Standards and Legislatures

    • Cyber security legislation

    • Data protection laws

    • Rules of background and words

  • Module 3: Types of Cyber Attack

    • Hardware vulnerabilities

    • Virus and malicious software

    • Spyware and ransomware

    • Attacks on mobile applications

    • IOT - Internet of Things

  • Module 4: Other Non-Technical Risks

    • Social engineering

    • Vishing - voice phising

    • Fake links

    • MITM attack

    • Identity theft

  • Module 5: Good Practices

    • Drafting policies and practices

    • Bring your own devices

    • Browsing safety

    • Use of social media

    • Passwords and 2FA

  • Module 6: Protect and Monitor Threats

    • 3 key principles of data protection

    • Obligations of cyber security

    • Audit and monitor

    • Digital hygiene

  • Module 7: Manage Incidents and Breaches

    • Definition of incident and breach

    • Reporting an incident

    • Recovering from an incident or breach

    • Public relations and response to the affected parties

  • Shah Alam Branch

    S1-30-12, D'sara Sentral, Jalan Welfare, Sungai Buloh, 40160, Shah Alam

Check out more Cybersecurity courses in Malaysia

Symphony Digest Logo

Cyber Security

Cyber Security course is offered by Symphony Digest. Whether you are looking for public courses or HR looking for in-house courses, Symphony has over 200 courses to suit your needs.

by Symphony Digest [Claim Listing ]
Inovasi EduTech Logo

Certified Information Security Manager

Certified Information Security Manager course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.

by Inovasi EduTech [Claim Listing ]
OSI Technology Sdn Bhd Logo

Cyber Defence For Network Administrator

The Cyber Defence for Network Administrator “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.

by OSI Technology Sdn Bhd [Claim Listing ]
AA Knowledge Malaysia Sdn Bhd Logo

Certificate In Cyber Security

Certificate in Cyber Security is offered by AA Knowledge Malaysia Sdn Bhd. We fill needs creatively and seek new ways of looking at old problems. By promoting learning, research, and education, we contribute to the advancement of education and training.

by AA Knowledge Malaysia Sdn Bhd [Claim Listing ]
GemRain Consulting Sdn Bhd (GRC) Logo

CISM (Certified Information Security Manager)

The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.

by GemRain Consulting Sdn Bhd (GRC)

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy