In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.
In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.
Course Objectives:
Upon completion of this program, the participants will be able to:
Understand landscape of cyber security around the world
Recognize the trends of cyber security
Understand standards and legislative requirements with regards to data protection
Recognize cyber attacks and other risks
Protect and monitor against threats
Manage cyber security incidents
Develop good cyber security practices for your organization
Key Content:
Module 1: Landscape Cyber Security
What is cyber security?
Trends of cyber security
Importance of data protection
Recent and major data breaches
Module 2: Standards and Legislatures
Cyber security legislation
Data protection laws
Rules of background and words
Module 3: Types of Cyber Attack
Hardware vulnerabilities
Virus and malicious software
Spyware and ransomware
Attacks on mobile applications
IOT - Internet of Things
Module 4: Other Non-Technical Risks
Social engineering
Vishing - voice phising
Fake links
MITM attack
Identity theft
Module 5: Good Practices
Drafting policies and practices
Bring your own devices
Browsing safety
Use of social media
Passwords and 2FA
Module 6: Protect and Monitor Threats
3 key principles of data protection
Obligations of cyber security
Audit and monitor
Digital hygiene
Module 7: Manage Incidents and Breaches
Definition of incident and breach
Reporting an incident
Recovering from an incident or breach
Public relations and response to the affected parties
Iconic Training Solutions Sdn. Bhd. was incorporated in January 2017 to develop every human capital to be a remarkable icon.
We run technical and non-technical training courses mainly for the companies in Malaysia where our main focus is to ensure our participants achieve their learning objectives and are competent to handle tasks in their workplace.
Our participants are also known to benefit from the trainers who are highly sought after and has relevant experience in the industry. With our tagline of ''going beyond'', our approach made us well known for providing services beyond our clients' expectations.
The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally.
The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security market.
Cyber threats are growing in complexity and the impact scale of cyber-crimes is increasing dramatically. With the advancement in internet technologies and inter-connectivity between devices and sensors, it is inevitable that the volume of personal and corporate data continues to increase.
Certified in the Governance of Enterprise IT course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.
Certificate in Cyber Security is offered by AA Knowledge Malaysia Sdn Bhd. We fill needs creatively and seek new ways of looking at old problems. By promoting learning, research, and education, we contribute to the advancement of education and training.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy