Fundamental Of Cyber Security

by Iconic Training Solutions Claim Listing

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Iconic Training Solutions Logo

img Duration

2 Days

Course Details

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

 

Course Objectives:

Upon completion of this program, the participants will be able to:

  • Understand landscape of cyber security around the world

  • Recognize the trends of cyber security

  • Understand standards and legislative requirements with regards to data protection

  • Recognize cyber attacks and other risks

  • Protect and monitor against threats

  • Manage cyber security incidents

  • Develop good cyber security practices for your organization

 

Key Content:

  • Module 1: Landscape Cyber Security

    • What is cyber security?

    • Trends of cyber security

    • Importance of data protection

    • Recent and major data breaches

  • Module 2: Standards and Legislatures

    • Cyber security legislation

    • Data protection laws

    • Rules of background and words

  • Module 3: Types of Cyber Attack

    • Hardware vulnerabilities

    • Virus and malicious software

    • Spyware and ransomware

    • Attacks on mobile applications

    • IOT - Internet of Things

  • Module 4: Other Non-Technical Risks

    • Social engineering

    • Vishing - voice phising

    • Fake links

    • MITM attack

    • Identity theft

  • Module 5: Good Practices

    • Drafting policies and practices

    • Bring your own devices

    • Browsing safety

    • Use of social media

    • Passwords and 2FA

  • Module 6: Protect and Monitor Threats

    • 3 key principles of data protection

    • Obligations of cyber security

    • Audit and monitor

    • Digital hygiene

  • Module 7: Manage Incidents and Breaches

    • Definition of incident and breach

    • Reporting an incident

    • Recovering from an incident or breach

    • Public relations and response to the affected parties

  • Shah Alam Branch

    S1-30-12, D'sara Sentral, Jalan Welfare, Sungai Buloh, 40160, Shah Alam

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy