FUNDAMENTAL OF CYBER SECURITY
FUNDAMENTAL OF CYBER SECURITY Safety & Health Selangor, Malaysia, Kuala Lumpur (KL), Shah Alam Training, Workshop | Iconic Training Solutions Sdn Bhd
FUNDAMENTAL OF CYBER SECURITY
DURATION: 2 DAYS
 
INTRODUCTION
 
According to a technology.org report, in 2017 cybercrimes have cost businesses and economies all over the world more than US$600 billion. And this number can grow by more than 10 times in 2021 an beyond! No company, individual or even government is spared on the growing dangers on being connected to the Internet.
Cybercrime can include theft, distortion, damage and destruction of data. It can result in loss of money, productivity, reputation., sometimes even property. Some attacks come in the form of embezzlement, fraud, ransom attacks, disruption to services, impersonation and more. As a result of attacks, time money and other resources are then required to restore, do forensic investigation, recover data, business services and even reputation.
With the rise of remote working and dependence of working through the Internet, it is important to be educated so that end-users can proactive, to protect and prepare against cyberattacks. In a 2-day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organisation. 

LEARNING OBJECTIVES
 
Upon completion of this programme, the participants will be able to:
  • Understand Landscape of Cyber Security around the world
  • Recognise the trends of Cyber Security
  • Understand Standards and Legislative Requirements with regards to data protection
  • Recognise Cyber Attacks and other Risks
  • Protect and Monitor against Threats
  • Manage Cyber Security Incidents
  • Develop good Cyber Security Practices for your organisation
 
KEY CONTENT
 
MODULE 1 – LANDSCAPE CYBER SECURITY
  • What is Cyber Security?
  • Trends of cyber security
  • Importance of Data Protection
  • Recent and major data breaches
 
MODULE 2 – STANDARDS AND LEGISLATURES
  • Cyber Security Legislations
  • Data Protection Laws
  • Rules of background and words
 
MODULE 3 – TYPES OF CYBER ATTACK
  • Hardware Vulnerabilities
  • Virus and Malicious Software
  • Spyware and Ransomware
  • Attacks on Mobile Applications
  • IOT – Internet of Things
 
MODULE 4 – OTHER NON-TECHNICAL RISKS
  • Social Engineering
  • Vishing – Voice Phishing
  • Fake Links
  • MITM Attack
  • Identity theft
 
MODULE 5 – GOOD PRACTICES
  • Drafting policies and practices
  • Bring your own Devices
  • Browsing Safely
  • Use of Social Media
  • Passwords and 2FA
 
MODULE 6 – PROTECT AND MONITOR THREATS
  • Three key Principles of Data Protection
  • Obligations of Cyber Security
  • Audit and Monitor
  • Digital hygiene
 
MODULE 7 – MANAGE INCIDENTS AND BREACHES
  • Definition of incident and breach
  • Reporting an incident
  • Recovering from an incident or breach
  • Public Relations and Response to the affected parties
 
METHODOLOGY
 
In this training, the trainer will be using PowerPoint presentations, slides, discussions, videos, stories, case studies, activities and participants are required to deliver a mock presentation at the end of the session. 
 
TARGET AUDIENCE
 
This program is suitable for all levels of employees

Please leave your enquiry here, we will reply as soon as possible.


*only support gif, jpeg, jpg, png, pdf
Switch To Desktop Version