In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.
In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.
Course Objectives:
Upon completion of this program, the participants will be able to:
Understand landscape of cyber security around the world
Recognize the trends of cyber security
Understand standards and legislative requirements with regards to data protection
Recognize cyber attacks and other risks
Protect and monitor against threats
Manage cyber security incidents
Develop good cyber security practices for your organization
Key Content:
Module 1: Landscape Cyber Security
What is cyber security?
Trends of cyber security
Importance of data protection
Recent and major data breaches
Module 2: Standards and Legislatures
Cyber security legislation
Data protection laws
Rules of background and words
Module 3: Types of Cyber Attack
Hardware vulnerabilities
Virus and malicious software
Spyware and ransomware
Attacks on mobile applications
IOT - Internet of Things
Module 4: Other Non-Technical Risks
Social engineering
Vishing - voice phising
Fake links
MITM attack
Identity theft
Module 5: Good Practices
Drafting policies and practices
Bring your own devices
Browsing safety
Use of social media
Passwords and 2FA
Module 6: Protect and Monitor Threats
3 key principles of data protection
Obligations of cyber security
Audit and monitor
Digital hygiene
Module 7: Manage Incidents and Breaches
Definition of incident and breach
Reporting an incident
Recovering from an incident or breach
Public relations and response to the affected parties
Iconic Training Solutions Sdn. Bhd. was incorporated in January 2017 to develop every human capital to be a remarkable icon.
We run technical and non-technical training courses mainly for the companies in Malaysia where our main focus is to ensure our participants achieve their learning objectives and are competent to handle tasks in their workplace.
Our participants are also known to benefit from the trainers who are highly sought after and has relevant experience in the industry. With our tagline of ''going beyond'', our approach made us well known for providing services beyond our clients' expectations.
Cyber security is the practice of safeguarding systems, computers and data from digital attacks. These attacks often involve attempts to breach, modify, or damage the target’s computer system, resulting in interruption or downtime for services.
The training designed to supplement the managing of Cybersecurity and Information Security Awareness. It provides a more in-depth review of specific cybersecurity topics.
Network Security course is offered by Goldentusks Sdn Bhd. Serves the vision to promote the human capital and companies of Malysia with effective training and development process.
Cybersecurity course is offered by Semarak Training. Our team comprises of experienced professionals with industry background who are able to understand better the technical and business challenges to help our clients to close the competency gap and achieve their training goals in time.
Cyber Security course is offered by Comsystem. We are committed to provide the ultimate learning experience in our training programs in the form of corporate training, workshops and courses.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy