Module:1 Getting Started
- Workshop Objectives
Module:2 Why Your Office Needs Administrative Procedures
- What is Cyberspace?
- What is Cyber Security?
- Why is Cyber Security Important?
- What is a Hacker?
- Case Study
Module:3 Types of Malware
- Worms
- Viruses
- Spyware
- Trojans
- Case Study
Module:4 Cyber Security Breaches
- Phishing
- Identity Theft
- Harassment
- Cyber Stalking
- Case Study
Module:5 Types of Cyber Attacks
-
- Password Attacks
- Denial of Service Attacks
- Passive Attack
- Penetration Testing
- Case Study
Module:6 Prevention Tips
- Craft a Strong Password
- Two-Step Verification
- Download Attachments with Care
- Question Legitimacy of Websites
- Case Study
Module:7 Mobile Protection
- No Credit Card Numbers
- Place Lock on Phone
- Don’t Save Passwords
- No Personalized Contacts Listed
- Case Study
Module:8 Social Network Security
- Don’t Reveal Location
- Keep Birthdate Hidden
- Have Private Profile
- Don’t Link Accounts
- Case Study
Module:9 Prevention Software
- Firewalls
- Virtual Private Networks
- Anti-Virus & Anti-Spyware
- Routine Updates
- Case Study
Module:10 Critical Cyber Threats
- Critical Cyber Threats
- Cyber Terrorism
- Cyber Warfare
- Cyber Espionage
- Case Study
Module:11 Defense Against Hackers
- Cryptography
- Digital Forensics
- Intrusion Detection
- Legal Recourse
- Case Study
Module:12 Wrapping Up
Be the first to add a review.
Please, login to leave a review