Quick Look Course Summary:Cyber security Course
  • Next Public Course Date:

  • Length: 1 day(s)

  • Price (at your venue): 1 Person R 3,982.50 EX VAT 3 Person R 2,729.81 EX VAT 10 Person R 1,885.40 EX VAT

  • Certification Type: Non-Accredited

  • Locations & Venues: Off-site or in-house. We train in all major city centres throughout South Africa.

Get Free & personalised
Training Advice

Knowing your course will help us prepare for our consultation and phone call.

The more people you send on our courses, the cheaper the unit cost.

YesNo

Input this code: captcha

Cyber security Course: Introduction

Phishing, malware, hacking, scams – we have all heard the terms before. People who approach you via the internet, who want your information for nefarious reasons. As if that isn’t enough, you MUST have some sort of anti-virus software running and if this is a company computer – a fire-wall is a necessity. Our cyber security workshop will walk you through what you need to know about cyber security, and then we’ll give you the tools to keep you safe on-line. This course is intended for individuals as well as companies.

Cyber security Course :Course Outline

In the present day it has become imperative to protect oneself in cyberspace. We offer an essential workshop to teach participants the fundamentals of cyber security as well as some of the techniques that should be implemented to make sure their privacy and computer systems are protected. The fixers and the destroyers in cyberspace are the hackers. We have all heard of ‘grey hats’ the so called hackers with a conscience. The other two types are the ‘black hats’ who malevolently hack into systems because they’re being paid to do it; and the ‘white hats’ who are hackers hired by companies to find their weak spots and fix them. Malware is the abbreviated term for malicious software. Malware can include worms, viruses, spyware and Trojans. If that’s not enough, there is also phishing, which are scams aiming to obtain personal information by appearing to be a legitimate source. Some scams don’t only want your personal information – they want to steal your identity. Or they want to steal customer lists from companies. This is way it is imperative to be mindful of phishing websites, to have an anti malware program and to be very careful when responding to unsolicited requests for personal information. The most harmful of these scams are to harass people and companies and to cyber stalk individuals. Both are criminal in intent and one should get the authorities involved. There are ways to strengthen access to your computer and to make website access more strictly controlled. Some of these ways include crafting a strong password, using a two step verification process, checking the authenticity of downloads before downloading and checking the legitimacy of websites. Our mobile phones run on the same technology that computers do, with processors and built in memories and may other components. They are just as vulnerable to the hackers as computers are thus it is imperative that the same precautions be taken with phone passwords.TIP: Store all passwords as you would store important documents. If you have a safe, use it. If you have a safe on your phone, only use it if it encrypts passwords and other vital information. At the very least keep a written copy of passwords in a drawer with a lock on it. Now that we have identified and discussed the dangers, we will teach participants about preventative measures such as fire-walls and the two types there are. Virtual private networks and how they work and anti-virus and anti-spyware software. We end the workshop by discussing cyber terrorism and cyber espionage and our defences to hackers. We will also talk about cryptography, digital forensics, intrusion detection and your legal recourse. 1. Introduction
Workshop objectives

2. Cyber security fundamentals
Cyberspace
Cyber security
Importance of security
Hackers
Case study

3. Malware
Worms
Viruses
Spyware
Trojans
Case study

4. Cyber security breaches
Phishing
Identity theft
Harassment
Cyber stalking
Case study

5. Types of attacks
Password attacks
Denial of service Attacks
Passive attacks
Penetration testing
Case study

6. Prevention tips
Strong passwords
Two step verification
Download attachments with care
Look at legitimacy of websites
Case study

7. Mobile protection
No credit card numbers
Place lock on phone
Don’t save passwords
No personalised contacts listed
Case study

8. Social network security
Don’t reveal location
Keep birthdates hidden
Private profile
Don’t link accounts
Case study

9. Prevention software
Firewalls
Viral private networks
Anti-virus and anti-spyware
Routine Updates
Case study

10. Critical cyber threats
Cyber threats
Cyber terrorism
Cyber warfare
Cyber espionage
Case study

11. Defence against hackers
Cryptography
Digital forensics
Intrusion detection
Legal recourse
Case study

12. Topics not discussed
Post workshop overview

Cyber security Course: Course Duration

1 day/s

Who should attend: Cyber security Course

This course is intended for anyone wanting to learn more about cyber security and how to protect themselves on-line.

**Quote does not include Any Exam Fees (if applicable)

IMPORTANT ACTION: Do Not Wait To Improve Your Skills.  

Book Now By Completing Online Booking Form / Customised Proposal or Obtain Approval For Your Already Received Customised Proposal

Realize incredible savings by sending more delegates

Do you want to save costs by doing training at your premises?

Region *

Accredited Courses

Additional Courses

Software & IT Courses

Top Rated