Fundamental Of Cyber Security

by Iconic Training Solutions Claim Listing

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Iconic Training Solutions Logo

img Duration

2 Days

Course Details

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

 

Course Objectives:

Upon completion of this program, the participants will be able to:

  • Understand landscape of cyber security around the world

  • Recognize the trends of cyber security

  • Understand standards and legislative requirements with regards to data protection

  • Recognize cyber attacks and other risks

  • Protect and monitor against threats

  • Manage cyber security incidents

  • Develop good cyber security practices for your organization

 

Key Content:

  • Module 1: Landscape Cyber Security

    • What is cyber security?

    • Trends of cyber security

    • Importance of data protection

    • Recent and major data breaches

  • Module 2: Standards and Legislatures

    • Cyber security legislation

    • Data protection laws

    • Rules of background and words

  • Module 3: Types of Cyber Attack

    • Hardware vulnerabilities

    • Virus and malicious software

    • Spyware and ransomware

    • Attacks on mobile applications

    • IOT - Internet of Things

  • Module 4: Other Non-Technical Risks

    • Social engineering

    • Vishing - voice phising

    • Fake links

    • MITM attack

    • Identity theft

  • Module 5: Good Practices

    • Drafting policies and practices

    • Bring your own devices

    • Browsing safety

    • Use of social media

    • Passwords and 2FA

  • Module 6: Protect and Monitor Threats

    • 3 key principles of data protection

    • Obligations of cyber security

    • Audit and monitor

    • Digital hygiene

  • Module 7: Manage Incidents and Breaches

    • Definition of incident and breach

    • Reporting an incident

    • Recovering from an incident or breach

    • Public relations and response to the affected parties

  • Shah Alam Branch

    S1-30-12, D'sara Sentral, Jalan Welfare, Sungai Buloh, 40160, Shah Alam

Check out more Cybersecurity courses in Malaysia

Comsystem Logo

Network Security (Fundamentals)

Network Security course is offered by Comsystem. We are committed to provide the ultimate learning experience in our training programs in the form of corporate training, workshops and courses.

by Comsystem [Claim Listing ]
Inovasi EduTech Logo

CompTIA Cybersecurity Analyst CySA

CompTIA Cybersecurity Analyst CySA course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.

by Inovasi EduTech [Claim Listing ]
OSI Technology Sdn Bhd Logo

Cyber Defence For Network Administrator

The Cyber Defence for Network Administrator “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.

by OSI Technology Sdn Bhd [Claim Listing ]
Academy Adelphi Worldwide Edu Sdn Bhd Logo

Network Defender

Network Defender course is offered by Academy Adelphi Worldwide Edu Sdn Bhd. Our in-house training option enables you to select the mix of participants to ensure optimum results and promote team spirit.

by Academy Adelphi Worldwide Edu Sdn Bhd [Claim Listing ]
GemRain Consulting Sdn Bhd (GRC) Logo

CISM (Certified Information Security Manager)

The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.

by GemRain Consulting Sdn Bhd (GRC) [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy