Type
Virtual
Classroom ILT
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Introduction
The purpose of the Cybersecurity Awareness training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.
Audience profile
This course is specifically designed for:
- Todays’ computer users, who use the internet and the world wide web (www) extensively to work, study and play but not aware of all the computer security issues
- Anybody interested in entering the field of cybersecurity
Pre-requisites
- Basic computer literacy
- Basic PC operating system navigation skills
- Basic Internet usage skills
Course objectives
Upon completing this course, the learner will understand the following:
- Personal Computer Security
- Password Safety
- Personal Information
- Removable Media
- Social Engineering
- Identity Theft
- Email Security
- Safe Browsing
- Data Protection
- Encryption
- Physical Security
- Online Transactions Security
- Digital Signature & Certificates
- Data Backup
- Social Networking
- Antiviruses Protection
- Disaster Recovery
- Internet Security
- Credit Card Frauds
- Monitoring Kids online
- Wireless & Home Network Security
- Bluetooth Security
- Smartphone Security
- Mobile Device Security
- Windows OS & Mac OS Security
- Compliance
- Securing IoT devices and Gaming Consoles
- Secure Remote Work
Course content
Foundations of Security | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Securing Operating Systems | |
|
|
|
|
|
|
|
|
|
|
|
|
Protecting System Using Antiviruses | |
|
|
|
|
|
|
|
|
|
|
Data Backup and Disaster Recovery | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Internet Security | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Securing Network Connections | |
|
|
|
|
|
|
|
|
|
|
Securing Online Transactions | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Securing Email Communications | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Social Engineering and Identity Theft | |
|
|
|
|
|
|
|
|
|
|
|
|
Security on Social Networking Sites | |
|
|
|
|
|
|
|
|
|
|
Securing Mobile Devices | |
|
|
|
|
|
|
|
|
|
|
|
Associated certification Exam and Content
This is not an official accredited course. Torque IT developed the content using the official content and best practices from various cybersecurity vendors whom we are accredited with to deliver official training.
- Students will be issued a 2–3-page hand-out on content covered
- 15 minutes assessment included at the end of the training to show proven record of accomplishment of skills development
Certificate of Attendance will be issued post workshop attendance.
Students who wish to further their cybersecurity skills and education and attain Certification, they will be required to attend any of the below mentioned Certification courses via Instructor-Led Training or Self-Paced studying and write the Associated International Exam:
EC-Council Certified Secure Computer User
EC-Council Certified Cybersecurity Technician
EC-Council Certified Network Defender
EC-Council Ethical Hacking and Countermeasures
CompTIA Security+
CompTIA Cybersecurity Analyst
ISC2 Certified in Cybersecurity
ISC2 Certified Information Systems Security Professional
EC-Council Overview
To beat a hacker, you need to think like one…
Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.
Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.
These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.