Cyber Security Like a Pro

Course Description

The advent of the internet has changed the way businesses work.  From Sales and Marketing to Logistics and Accounting, effective use of technology and communications is paramount in all facets of a companies organization.

As companies add more and more technology and access to our their organizational environments, a multifaceted approach to security and business continuity should be at the top of every companies priority list.

It is not a matter of if, but when, a company will be the target of cyber-criminals.  

This training will provide a solid foundation for how to identify threats, build a secure infrastructure, and arm employees with the information they need to make the right decisions when it comes to the security of company information.

This training is for you if…

  • You’re surfing the Web and you don’t understand all the risks.
  • You use a computer for work purposes.
  • You want to help your company protect against cyber attacks.
  • You are unsure about proper safety protocols.
  • You are concerned about the current safety measures you have in place.
  • You want to be part of the solution and not part of the problem.

What you will learn…

  • The main types of attacks and how to protect yourself.
  • Develop skills to recognize malware.
  • Adopt safe practices to protect yourself and your organization.
  • Good practices to adopt at home, in the workplace or in public settings.
  • Password management and other valuable security tips.

Brochure and details

Click here for more details and see the brochure

Video capsules

  • Online E-learning.

To make an order or get pricing click here

Course curriculum

  • 1

    Module 1 - Cybercrime - A few statistics

    • Introduction

    • 1.01 - Cybercrime by-the-numbers

    • 1.02 - It's NOT only about large enterprise

    • 1.03 - In a nutshell

    • 1.04 - Congrats!

    • Test your knowledge

  • 2

    Module 2 - The origin of attacks

    • 2.01 - Where do the attacks come from

    • 2.02 - Mobile devices

    • 2.03 - The sources of attack

    • 2.04 - What about Wi-Fi

    • 2.05 - Are you using the right app

    • 2.06 - In a nutshell

    • 2.07 - Congrats!

    • Test your knowledge

  • 3

    Module 3 - Understanding the various types of attack

    • 3.01 - Types of attacks

    • 3.02 - Ransomware

    • 3.03 - Data leak

    • 3.04 - Executive imposter

    • 3.05 - Phishing

    • 3.06 - Spyware

    • 3.07 - Social engineering

    • 3.08 - In a nutshell

    • 3.09 - Congrats!

    • Test your knowledge

  • 4

    Module 4 - Better safe than sorry!

    • 4.01 - Tips and tricks

    • 4.02 - Social networks

    • 4.03 - Paper management

    • 4.04 - Password management

    • 4.05 - Identification

    • 4.06 - Useful tips

    • 4.07 - HTTP what?

    • 4.08 - Congrats!

    • Test your knowledge