Trusted Training Partners

Quick Look Course Summary:Cyber security Course
  • Next Public Course Date:

  • Length: 1 day(s)

  • Price (at your venue): 1 Person R 3,982.50 EX VAT 3 Person R 2,729.81 EX VAT 10 Person R 1,885.40 EX VAT

  • Certification Type: Non-Accredited

  • Locations & Venues: Off-site or in-house. We train in all major city centres throughout South Africa.

Get Free & personalised
Training Advice

    Knowing your course will help us prepare for our consultation and phone call.

    The more people you send on our courses, the cheaper the unit cost.

    YesNo

    Input this code: captcha

    Cyber security Course: Introduction

    Phishing, malware, hacking, scams – we have all heard the terms before. People who approach you via the internet, who want your information for nefarious reasons. As if that isn’t enough, you MUST have some sort of anti-virus software running and if this is a company computer – a fire-wall is a necessity. Our cyber security workshop will walk you through what you need to know about cyber security, and then we’ll give you the tools to keep you safe on-line. This course is intended for individuals as well as companies.

    Cyber security Course :Course Outline

    In the present day it has become imperative to protect oneself in cyberspace. We offer an essential workshop to teach participants the fundamentals of cyber security as well as some of the techniques that should be implemented to make sure their privacy and computer systems are protected. The fixers and the destroyers in cyberspace are the hackers. We have all heard of ‘grey hats’ the so called hackers with a conscience. The other two types are the ‘black hats’ who malevolently hack into systems because they’re being paid to do it; and the ‘white hats’ who are hackers hired by companies to find their weak spots and fix them. Malware is the abbreviated term for malicious software. Malware can include worms, viruses, spyware and Trojans. If that’s not enough, there is also phishing, which are scams aiming to obtain personal information by appearing to be a legitimate source. Some scams don’t only want your personal information – they want to steal your identity. Or they want to steal customer lists from companies. This is way it is imperative to be mindful of phishing websites, to have an anti malware program and to be very careful when responding to unsolicited requests for personal information. The most harmful of these scams are to harass people and companies and to cyber stalk individuals. Both are criminal in intent and one should get the authorities involved. There are ways to strengthen access to your computer and to make website access more strictly controlled. Some of these ways include crafting a strong password, using a two step verification process, checking the authenticity of downloads before downloading and checking the legitimacy of websites. Our mobile phones run on the same technology that computers do, with processors and built in memories and may other components. They are just as vulnerable to the hackers as computers are thus it is imperative that the same precautions be taken with phone passwords.TIP: Store all passwords as you would store important documents. If you have a safe, use it. If you have a safe on your phone, only use it if it encrypts passwords and other vital information. At the very least keep a written copy of passwords in a drawer with a lock on it. Now that we have identified and discussed the dangers, we will teach participants about preventative measures such as fire-walls and the two types there are. Virtual private networks and how they work and anti-virus and anti-spyware software. We end the workshop by discussing cyber terrorism and cyber espionage and our defences to hackers. We will also talk about cryptography, digital forensics, intrusion detection and your legal recourse. 1. Introduction
    Workshop objectives

    2. Cyber security fundamentals
    Cyberspace
    Cyber security
    Importance of security
    Hackers
    Case study

    3. Malware
    Worms
    Viruses
    Spyware
    Trojans
    Case study

    4. Cyber security breaches
    Phishing
    Identity theft
    Harassment
    Cyber stalking
    Case study

    5. Types of attacks
    Password attacks
    Denial of service Attacks
    Passive attacks
    Penetration testing
    Case study

    6. Prevention tips
    Strong passwords
    Two step verification
    Download attachments with care
    Look at legitimacy of websites
    Case study

    7. Mobile protection
    No credit card numbers
    Place lock on phone
    Don’t save passwords
    No personalised contacts listed
    Case study

    8. Social network security
    Don’t reveal location
    Keep birthdates hidden
    Private profile
    Don’t link accounts
    Case study

    9. Prevention software
    Firewalls
    Viral private networks
    Anti-virus and anti-spyware
    Routine Updates
    Case study

    10. Critical cyber threats
    Cyber threats
    Cyber terrorism
    Cyber warfare
    Cyber espionage
    Case study

    11. Defence against hackers
    Cryptography
    Digital forensics
    Intrusion detection
    Legal recourse
    Case study

    12. Topics not discussed
    Post workshop overview

    Cyber security Course: Course Duration

    1 day/s

    Who should attend: Cyber security Course

    This course is intended for anyone wanting to learn more about cyber security and how to protect themselves on-line.

    **Quote does not include Any Exam Fees (if applicable)

    IMPORTANT ACTION: Do Not Wait To Improve Your Skills.  

    Book Now By Completing Online Booking Form / Customised Proposal or Obtain Approval For Your Already Received Customised Proposal

    Realize incredible savings by sending more delegates

    Do you want to save costs by doing training at your premises?

    Region *

    Accredited Courses

    Additional Courses

    Software & IT Courses

    Top Rated