Course Code: 18998

Foundation of Security - Cybersecurity Awareness & Phishing Training

Class Dates:
10/1/2021
8/6/2021
Length:
1/2 Days
Cost:
$99.00
Class Time:
Technology:
Security
Delivery:
Instructor-Led Training, Virtual Instructor-Led Training

Overview

  • Course Overview
  • This course will provide the foundational concepts for the cybersecurity field. We will look at the field as a whole, examine various types of attacks, learn ways to protect our environments through tools and design, and wrap up looking at more advanced topics.
  • Audience
  • This course is intended for anyone with an interest in the cybersecurity industry.

    Whether you’re already working in the field or are looking for a career change, this course is for you.

Prerequisites

Course Details

  • Course Objectives
  • Introduction to Security
  • Securing Emails and Safe Chatting
  • Staying Safe on Social Networking Sites
  • Securing Web Browsers
  • Using Secure Passwords
  • Understanding Phishing Attacks
  • Malware and Spyware
  • Online Predators
  • Securing Systems
  • Social Engineering
  • Identity Theft
  • Securing Mobile Devices
  • .
  • Cyberbullying
  • Secure Online Shopping
  • Secure Online Gaming
  • Internet Ethics
  • Significance of Copyrights
  • Security Best Practices
  • Introduction to Security
  • Security is a state of well-being of information and infrastructure
  • Computer/mobile security refers to the protection of systems/mobile and the
  • You can protect the information assets by following precautions against
  • Losses due to Security Attacks
  • Financial Loss
  • Data Loss
  • Identity Theft
  • Misuse of Computer Resources
  • Securing Emails
  • Spam Mail
  • Phishing Mail
  • Fake Emails
  • Risks
  • Guidelines
  • Questions & Answers
  • Chatting Safely
  • Google Talk
  • AOL
  • Skype
  • Yahoo Messenger
  • Windows Live messenger
  • Meeb
  • Internet Relay Chat
  • Risks & Threats
  • Guidlelines
  • Questions & Answers
  • Social Networking Sites
  • Facebook
  • Twitter
  • Flicker
  • LinkedIn
  • Myspace
  • Orkut
  • You Tube
  • Stumbleupon
  • Digg
  • Technorati
  • Risks & Attacks
  • Guidelines, Questions & Answers
  • Securing Browsers
  • Phishing
  • Spyware
  • Cookies
  • Pop-Ups
  • Guidelines to Secure
  • Questions & Answers
  • Securing Passwords
  • Risks
  • Securing Device
  • Guidelines for Securing Passwords
  • Questions & Answers
  • Understanding Phishing Attacks
  • Pop-up Messages
  • Spam
  • Questions & Answers
  • Malware & Spyware
  • Viruses
  • Spyware Risks
  • Slow down computer
  • Malware Risks
  • Pop-Up Ads
  • Keystrokes
  • System Performance
  • Unwanted Software
  • Advertising email
  • General Guidelines
  • Anti-virus
  • Questions and Answers
  • Online Predators
  • Emails
  • Chat Rooms
  • By Grooming Process
  • Social Networking Websites
  • Questions & Answers
  • Securing Systems
  • Operating Systems (OS)
  • Unauthorized users
  • Guidelines
  • Questions and Answers
  • Social Engineering
  • Convincing People
  • Human-based
  • Computer-based
  • Guidelines
  • Questions & Answers
  • Identity Theft
  • Computer Discarded
  • Mail Theft
  • Social Sciences
  • Dumpster Diving
  • Best Practices
  • Guidelines
  • Questions and Answers
  • Securing Mobile Devices
  • Spam
  • Exposure of Critcal Information
  • Mobile Viruses
  • Email Viruses
  • Lost or Stolen
  • Guidelines
  • Questions and Answers
  • Cyberbullying
  • Internet Applications
  • Technologies
  • Guidelines
  • Questions & Answers
  • Online Shopping
  • Risks
  • Guidelines
  • Payment Services
  • Secure Website
  • Questions and Answers
  • Online Gaming
  • Technological Risks,
  • Online Gaming : Dont’s
  • Online Gaming : Do’s
  • Questions and Answers
  • Internet Ethics
  • Laws
  • Policies
  • Rights and Property
  • Questions and Answers
  • Significance of Copyrights
  • Guidelines
  • Examples
  • Questions and Answers
  • Security Best Practices
  • Guidelines for Safe Downloads
  • Guidelines for Public Computers
  • Guidelines for Blogs
  • General Online Safety
  • Questions and Answers
  • Case Studies
  • Case Study One
  • Case Study Two
  • Case Study Three
  • Case Study Four