Fundamental Of Cyber Security

by Iconic Training Solutions Claim Listing

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Iconic Training Solutions Logo

img Duration

2 Days

Course Details

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

 

Course Objectives:

Upon completion of this program, the participants will be able to:

  • Understand landscape of cyber security around the world

  • Recognize the trends of cyber security

  • Understand standards and legislative requirements with regards to data protection

  • Recognize cyber attacks and other risks

  • Protect and monitor against threats

  • Manage cyber security incidents

  • Develop good cyber security practices for your organization

 

Key Content:

  • Module 1: Landscape Cyber Security

    • What is cyber security?

    • Trends of cyber security

    • Importance of data protection

    • Recent and major data breaches

  • Module 2: Standards and Legislatures

    • Cyber security legislation

    • Data protection laws

    • Rules of background and words

  • Module 3: Types of Cyber Attack

    • Hardware vulnerabilities

    • Virus and malicious software

    • Spyware and ransomware

    • Attacks on mobile applications

    • IOT - Internet of Things

  • Module 4: Other Non-Technical Risks

    • Social engineering

    • Vishing - voice phising

    • Fake links

    • MITM attack

    • Identity theft

  • Module 5: Good Practices

    • Drafting policies and practices

    • Bring your own devices

    • Browsing safety

    • Use of social media

    • Passwords and 2FA

  • Module 6: Protect and Monitor Threats

    • 3 key principles of data protection

    • Obligations of cyber security

    • Audit and monitor

    • Digital hygiene

  • Module 7: Manage Incidents and Breaches

    • Definition of incident and breach

    • Reporting an incident

    • Recovering from an incident or breach

    • Public relations and response to the affected parties

  • Shah Alam Branch

    S1-30-12, D'sara Sentral, Jalan Welfare, Sungai Buloh, 40160, Shah Alam

Check out more Cybersecurity courses in Malaysia

Training Asia Logo

Cyber Security Awareness

Cyber security is the practice of safeguarding systems, computers and data from digital attacks. These attacks often involve attempts to breach, modify, or damage the target’s computer system, resulting in interruption or downtime for services.

by Training Asia [Claim Listing ]
Mideast Malaysia Business and Training Logo

Managing Cybersecurity & Security Awareness

The training designed to supplement the managing of Cybersecurity and Information Security Awareness. It provides a more in-depth review of specific cybersecurity topics.

by Mideast Malaysia Business and Training [Claim Listing ]
Goldentusks Sdn Bhd Logo

Network Security

Network Security course is offered by Goldentusks Sdn Bhd. Serves the vision to promote the human capital and companies of Malysia with effective training and development process.

by Goldentusks Sdn Bhd [Claim Listing ]
Semarak Training Logo

Cybersecurity Full Reskilling Program

Cybersecurity course is offered by Semarak Training. Our team comprises of experienced professionals with industry background who are able to understand better the technical and business challenges to help our clients to close the competency gap and achieve their training goals in time.

by Semarak Training [Claim Listing ]
Comsystem Logo

Cyber Security (Attack & Countermeasures)

Cyber Security course is offered by Comsystem. We are committed to provide the ultimate learning experience in our training programs in the form of corporate training, workshops and courses.

by Comsystem [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy