• Post category:StudyBullet-7
  • Reading time:6 mins read


Protect Your Personal and Company Information

What you will learn

Definitions of Cyber Security

Importance and Applications of Cyber Security

Types of Cyber Attacks

Personal and Organizational Data and Vulnerability

Vulnerabilities, Malwares and Ransomware

The Cyber Security Framework – Identify, Protect, Detect, Respond, Recover

Tips Dealing with Cyber Attacks – Data and Devices, Wireless Network, Ransomware, Phishing, Spoofing etc.

Description

Data, device and information security is becoming more and more important these days, not only for organizations but also for individuals who needs to protects any cyber-related attacks to their data.

The course, CyberSecurity focuses on learning the skills and very simple (and also complex) tips that immediately helps you in protecting your personal, sensitive and private information, data and devices from cyber-related attacks or other forms of attacks on your personal data or organizational.

Understanding these skills and tips does not require great expertise skills except in complex situations where you can simply use the expertise of the professional, so you can strat immediately with ideas learn in this course.

The course is applicable to people on all levels.

Course Modules / Structure

The Course is divided into 4 Modules:

Module 1: Introduction to Cyber Security

Module 2: Personal and Organizational Data and Vulnerability

Module 3: The Cyber Security Framework

Module 4: Dealing with Cyber Attacks – Tips

CASE STUDY – Using Fictional Person/Name like Dominic

– Dominic works at a start up company where they are currently facing some cyber related attacks on daily basis

– Dominic also notices that his personal data in his company laptop maybe endangered

– Dominic also realizes that the company is slow to responding to these attacks and he would like to take some personal steps/actions himself to help both his personal data and company information


Get Instant Notification of New Courses on our Telegram channel.


– Dominic will also want to apply this cyber-attack-preventive skills on his own laptop

CASE STUDY ANALYSIS:

– In case above, what do you think Dominic should consider doing?

What You will learn in this course (Takeaways)

– Definitions of Cyber Security

– Importance and Applications of Cyber Security

– Types of Cyber Attacks

– Personal and Organizational Data and Vulnerability

– Vulnerabilities, Malwares and Ransomware

– Methods of Infiltration – Phishing, DoS, Wi-Fi

– The Cyber Security Framework – Identify, Protect, Detect, Respond, Recover

– Tips Dealing with Cyber Attacks – Data and Devices, Wireless Network, Ransomware, Phishing, Spoofing etc.

NOTE: Your Review is Highly Valued

We value your feedback, please leave us a review after finishing the course, it will always be appreciated for future improvements.

English
language

Content

Module 0 – General Introduction and Course Description

Course Introduction

Module 1 – Introduction to Cyber Security

Topics – Introduction to Cyber Security
Definitions – Cyber Security
Importance and Applications of Cyber Security
Cyber Attacks or Threats – Definition and Types

Module 2 – Personal and Organizational Data and Vulnerability

Topics – Personal and Organizational Data and Vulnerability
Personal Data, Sensitive Data, Private Data
Organizational Data and Principles
Cyber Security Vulnerabilities and Risks

Module 3 – The Cyber Security Framework

Topics – The Cyber Security Framework
Cyber Security Framework – Introduction
Identify – Policy, Roles and Responsibilities
Protect – Control, Encrypt, Backup and Training
Detect – Monitor, Report and Investigate
Respond – Have a Plan
Recover – After an Attack

Module 4 – Dealing with Cyber Attacks – Tips

Topics – Dealing with Cyber Attacks – Tips
Physical Security – Protect Your Files, Data and Devices
Secure Remote Access – Protect Your Network
Email Authentication
Dealing with Spoofing (Business Email Imposters)
Dealing with Ransomware
Dealing with Phishing
Dealing with Technical Support Scams
Cyber Insurance Policy
Vendor Security – Monitor Your Vendors
New or Upgrading Website – Hire a Web Host

Course Summary

Course Summary