Uploaded on Jul 12, 2024
Join industry leaders in a highly interactive 16-hour LIVE training designed to empower you with the latest tools and techniques for safeguarding your digital life. Whether your team comprises seasoned cybersecurity professionals or newcomers to the field, our comprehensive course content covers everything from fundamental security principles to advanced threat mitigation strategies.
Cybersecurity Awareness 2.0 Enterprise Training
Cybersecur
ity
EAntwerparriseen Terasinsin g
D2efe.n0d & Protect Your Digital
Workspace
www.infosectrain.co
m
Program Highlights
In our hyper-connected digital world, cyber threats have become a
daily reality. InfosecTrain’s Cybersecurity Awareness Training 2.0 is
designed to equip you with the knowledge and skills to navigate the
online landscape securely.
Whether you’re a professional, a student, or simply someone who
wants to safeguard your digital life, this program is your gateway
to a safer online experience.
www.infosectrain.co
m
Course
Highlights
16-Hour Scenario-
of Instructor-led Based
Training Learning
In-depth Learn from
Case Industry Experts
Studies
Highly Interactive Access to
and Recorded
Dynamic Sessions Sessions
Extended Post Career Guidance
Training and Mentorship
Support
Comprehensive
Cybersecurity
Curriculum
www.infosectrain.co
m
Target Audience
It is designed for everyone, from cybersecurity
enthusiasts to employees of all backgrounds,
because everyone should be cyber-aware, whether in
IT or not.
Pre-Requisites
No experience is required.
Course Objectives
Grasp the importance of confidentiality, integrity, and
availability. Learn key terms such as threats, vulnerabilities,
risks, and impacts. Identify different types of cyber attacks:
phishing, social engineering, malware, and insider threats.
Adopt safe browsing habits and recognize suspicious
websites. Understand physical security measures like
device locking and application whitelisting.
Monitor credit reports and use security measures like credit
freezing Perform immediate steps to minimize damage from
security breaches Engage in hands-on simulations to contain
data breaches and malware infections.
Recognize AI-driven threats and deepfake technology risks
www.infosectrain.co
m
Course
Curriculum
Introduction to Information Security
What is Information Security?
Definition and Importance
Key Concepts: Confidentiality, Integrity, Availability
Definition of key terms: Threats, Vulnerability, Risk,
and Impact
Cost of cybercrime examples
Understanding Cyber Attacks
Types of Cyber Attacks
Phishing
Social
Engineering
Insider Threats
Malware
Motivations behind
cyberattacks
Service
disruption Data
exfiltration Case
Study
www.infosectrain.co
m
Basic Security Best Practices
Multi-Factor Authentication
How to set up 2FA on common platforms
Biometric
Authentication
Password
Authentication
Importance of
strong passwords
How to create
and manage
strong passwords
Employee Training
and Awareness
Safe Browsing
Habits
Identifying suspicious
websites
Using reputable web
browsers with built-in
security
Securing
Devices and
Endpoints
Endpoint Security
wwwM.inefoasseucrtersain.co
m
Install Antivirus/Antimalware
Software Awareness of Endpoints
Conducting a Security Checkup on
Personal Devices
Patch Management
Regular Updates
Automated
Patching
User Training and Awareness
Security Awareness
Training Policies and
Procedures
Physical Security
Device Locking
(Password, PIN, Smart
Card locks)
Application Whitelisting in
organizations
Approved Applications
Block Untrusted
Software
Symptoms of
Network and
Endpoint Attacks
Network Attack Symptoms
Increases bandwidth
usage Performs
degradation
Unusual Log-In
Attempts and Account
Lockouts
Endpoint Attack Symptoms
Unexpected Device
Behavior
Performance issues
Unauthorized
www.infosectrain.co
m changes
Strange pop-ups and
messages
Disabled Security
Software Firewall
disabled
Error messages/Failed
updates
Taking Action to Minimize Damage
Immediate Steps
Changing passwords on compromised
accounts Placing a fraud alert on your
credit report
Protecting Yourself from Identity Theft
Monitoring your credit report for suspicious
activity Freezing your credit if necessary
Enabling two-factor authentication (MFA) on
all accounts
Advanced Security Concepts
Securing Home and Office Networks
Securing Home and Office
Networks VPN and its benefits
Navigating the Digital World Safely
Email Security
Essentials Mobile
Security Measures
Responding to Image
Misuse
Identifying Image Misuse
Taking Action Against
Misuse
www.infosectrain.co
m
Social Engineering and Phishing Attacks
Phishing Attacks
Types of Phishing attacks
Social Engineering
Types of Social Engineering Attacks
UPI Scams
Fake KYC (Know Your Customer)
Updates WhatsApp Scams
LinkedIn Awareness ( Fake job
posting ) Securing Your Gmail
Account
Recognizing and Avoiding
Phishing Attacks
Identifying Phishing Emails and
Messages Phishing Simulation
Exercise
Symptoms of Malware
and Ransomware
Infections
Malware Infection
Symptoms Ransomware
Attack Symptoms
www.infosectrain.co
m
Social Media
Security
Privacy settings on social media
platforms Avoid oversharing personal
information online
Cloud Security
Understanding Cloud Storage Services
Benefits and risks of cloud storage
Popular cloud storage providers
Securing Your Cloud Accounts
Securing file-sharing permissions
Strong password creation and using
MFA Data encryption options in
cloud storage
AI and Deep Fake
Awareness
Understanding AI in Cybersecurity
AI-Driven Threats
Highly Personalized Phishing
Attempts Automated Attack
Patterns
Deepfake Technology
What are Deepfakes?
Risks Associated with Deepfakes
(Identity Theft, Misinformation)
Unrealistic Audio/Video Ǫuality
Inconsistencies in Background or
Timing
www.infosectrain.co
m
Incident Response and
Recovery
Understanding Incident Response
What is an Incident Response
Plan? Key Steps in Incident
Response
Creating an Incident Response Plan
Developing a Basic Incident Response
Plan Responding to Common Attacks
Responding to Malware Infections
Steps to Take if Infected by
Malware Using Malware
Removal Tools
Responding to Phishing Attacks
Identifying and Reporting Phishing
Attempts Reporting Phishing Emails
Data Breach Response
Immediate Steps to Take During a Data
Breach
Identifying and Containing the Breach
Notifying Internal Teams and
Stakeholders
Data Breach Containment Exercise
Hands-On Simulation: Containing a Data
Breach
Lwewgwa.li nafonsde cRteraginu.lcaotory Requirements
m
Reporting Obligations
Communicating with Affected
Parties
www.infosectrain.com |
[email protected]
Comments