In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.
In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.
Course Objectives:
Upon completion of this program, the participants will be able to:
Understand landscape of cyber security around the world
Recognize the trends of cyber security
Understand standards and legislative requirements with regards to data protection
Recognize cyber attacks and other risks
Protect and monitor against threats
Manage cyber security incidents
Develop good cyber security practices for your organization
Key Content:
Module 1: Landscape Cyber Security
What is cyber security?
Trends of cyber security
Importance of data protection
Recent and major data breaches
Module 2: Standards and Legislatures
Cyber security legislation
Data protection laws
Rules of background and words
Module 3: Types of Cyber Attack
Hardware vulnerabilities
Virus and malicious software
Spyware and ransomware
Attacks on mobile applications
IOT - Internet of Things
Module 4: Other Non-Technical Risks
Social engineering
Vishing - voice phising
Fake links
MITM attack
Identity theft
Module 5: Good Practices
Drafting policies and practices
Bring your own devices
Browsing safety
Use of social media
Passwords and 2FA
Module 6: Protect and Monitor Threats
3 key principles of data protection
Obligations of cyber security
Audit and monitor
Digital hygiene
Module 7: Manage Incidents and Breaches
Definition of incident and breach
Reporting an incident
Recovering from an incident or breach
Public relations and response to the affected parties
Iconic Training Solutions Sdn. Bhd. was incorporated in January 2017 to develop every human capital to be a remarkable icon.
We run technical and non-technical training courses mainly for the companies in Malaysia where our main focus is to ensure our participants achieve their learning objectives and are competent to handle tasks in their workplace.
Our participants are also known to benefit from the trainers who are highly sought after and has relevant experience in the industry. With our tagline of ''going beyond'', our approach made us well known for providing services beyond our clients' expectations.
Cyber Security course is offered by Symphony Digest. Whether you are looking for public courses or HR looking for in-house courses, Symphony has over 200 courses to suit your needs.
Certified Information Security Manager course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.
The Cyber Defence for Network Administrator “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.
Certificate in Cyber Security is offered by AA Knowledge Malaysia Sdn Bhd. We fill needs creatively and seek new ways of looking at old problems. By promoting learning, research, and education, we contribute to the advancement of education and training.
The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy