Uploaded on Jul 12, 2024
Join industry leaders in a highly interactive 16-hour LIVE training designed to empower you with the latest tools and techniques for safeguarding your digital life. Whether your team comprises seasoned cybersecurity professionals or newcomers to the field, our comprehensive course content covers everything from fundamental security principles to advanced threat mitigation strategies.
Cybersecurity Awareness 2.0 Enterprise Training
Cybersecur ity EAntwerparriseen Terasinsin g D2efe.n0d & Protect Your Digital Workspace www.infosectrain.co m Program Highlights In our hyper-connected digital world, cyber threats have become a daily reality. InfosecTrain’s Cybersecurity Awareness Training 2.0 is designed to equip you with the knowledge and skills to navigate the online landscape securely. Whether you’re a professional, a student, or simply someone who wants to safeguard your digital life, this program is your gateway to a safer online experience. www.infosectrain.co m Course Highlights 16-Hour Scenario- of Instructor-led Based Training Learning In-depth Learn from Case Industry Experts Studies Highly Interactive Access to and Recorded Dynamic Sessions Sessions Extended Post Career Guidance Training and Mentorship Support Comprehensive Cybersecurity Curriculum www.infosectrain.co m Target Audience It is designed for everyone, from cybersecurity enthusiasts to employees of all backgrounds, because everyone should be cyber-aware, whether in IT or not. Pre-Requisites No experience is required. Course Objectives Grasp the importance of confidentiality, integrity, and availability. Learn key terms such as threats, vulnerabilities, risks, and impacts. Identify different types of cyber attacks: phishing, social engineering, malware, and insider threats. Adopt safe browsing habits and recognize suspicious websites. Understand physical security measures like device locking and application whitelisting. Monitor credit reports and use security measures like credit freezing Perform immediate steps to minimize damage from security breaches Engage in hands-on simulations to contain data breaches and malware infections. Recognize AI-driven threats and deepfake technology risks www.infosectrain.co m Course Curriculum Introduction to Information Security What is Information Security? Definition and Importance Key Concepts: Confidentiality, Integrity, Availability Definition of key terms: Threats, Vulnerability, Risk, and Impact Cost of cybercrime examples Understanding Cyber Attacks Types of Cyber Attacks Phishing Social Engineering Insider Threats Malware Motivations behind cyberattacks Service disruption Data exfiltration Case Study www.infosectrain.co m Basic Security Best Practices Multi-Factor Authentication How to set up 2FA on common platforms Biometric Authentication Password Authentication Importance of strong passwords How to create and manage strong passwords Employee Training and Awareness Safe Browsing Habits Identifying suspicious websites Using reputable web browsers with built-in security Securing Devices and Endpoints Endpoint Security wwwM.inefoasseucrtersain.co m Install Antivirus/Antimalware Software Awareness of Endpoints Conducting a Security Checkup on Personal Devices Patch Management Regular Updates Automated Patching User Training and Awareness Security Awareness Training Policies and Procedures Physical Security Device Locking (Password, PIN, Smart Card locks) Application Whitelisting in organizations Approved Applications Block Untrusted Software Symptoms of Network and Endpoint Attacks Network Attack Symptoms Increases bandwidth usage Performs degradation Unusual Log-In Attempts and Account Lockouts Endpoint Attack Symptoms Unexpected Device Behavior Performance issues Unauthorized www.infosectrain.co m changes Strange pop-ups and messages Disabled Security Software Firewall disabled Error messages/Failed updates Taking Action to Minimize Damage Immediate Steps Changing passwords on compromised accounts Placing a fraud alert on your credit report Protecting Yourself from Identity Theft Monitoring your credit report for suspicious activity Freezing your credit if necessary Enabling two-factor authentication (MFA) on all accounts Advanced Security Concepts Securing Home and Office Networks Securing Home and Office Networks VPN and its benefits Navigating the Digital World Safely Email Security Essentials Mobile Security Measures Responding to Image Misuse Identifying Image Misuse Taking Action Against Misuse www.infosectrain.co m Social Engineering and Phishing Attacks Phishing Attacks Types of Phishing attacks Social Engineering Types of Social Engineering Attacks UPI Scams Fake KYC (Know Your Customer) Updates WhatsApp Scams LinkedIn Awareness ( Fake job posting ) Securing Your Gmail Account Recognizing and Avoiding Phishing Attacks Identifying Phishing Emails and Messages Phishing Simulation Exercise Symptoms of Malware and Ransomware Infections Malware Infection Symptoms Ransomware Attack Symptoms www.infosectrain.co m Social Media Security Privacy settings on social media platforms Avoid oversharing personal information online Cloud Security Understanding Cloud Storage Services Benefits and risks of cloud storage Popular cloud storage providers Securing Your Cloud Accounts Securing file-sharing permissions Strong password creation and using MFA Data encryption options in cloud storage AI and Deep Fake Awareness Understanding AI in Cybersecurity AI-Driven Threats Highly Personalized Phishing Attempts Automated Attack Patterns Deepfake Technology What are Deepfakes? Risks Associated with Deepfakes (Identity Theft, Misinformation) Unrealistic Audio/Video Ǫuality Inconsistencies in Background or Timing www.infosectrain.co m Incident Response and Recovery Understanding Incident Response What is an Incident Response Plan? Key Steps in Incident Response Creating an Incident Response Plan Developing a Basic Incident Response Plan Responding to Common Attacks Responding to Malware Infections Steps to Take if Infected by Malware Using Malware Removal Tools Responding to Phishing Attacks Identifying and Reporting Phishing Attempts Reporting Phishing Emails Data Breach Response Immediate Steps to Take During a Data Breach Identifying and Containing the Breach Notifying Internal Teams and Stakeholders Data Breach Containment Exercise Hands-On Simulation: Containing a Data Breach Lwewgwa.li nafonsde cRteraginu.lcaotory Requirements m Reporting Obligations Communicating with Affected Parties www.infosectrain.com | [email protected]
Comments