Certified Security Aware User (CSAU) | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

Certified Security Aware User (CSAU)

Location

Format What’s this?
Starting From
RM 1200.00
  1. 1 Day with 08 hours per day
  1. Tue 20 Sep 09:00 - Tue 20 Sep 17:00
  1. HRDF SBL Claimable
  2. Certificate of Attendance available
  1. 1 Days
  1. All of our private classes are customized to your organization's needs.
  2. Click on the button below to send us your details and you will be contacted shortly.
Request more information

Inquiry for: Myself    My Company

By providing your contact details, you agree to our Privacy Policy

 

 

 

Thank You

Our learning consultant will get back to you in 1 business day

Certified Security Aware User (CSAU)

WHAT YOU WILL LEARN

With all the news stories about hackers, botnets, and breaches involving personal information, it's easy for the security message to sound over-used and tired. It's easy for people to say, "It won't happen here." Yet, studies and surveys repeatedly show that: the human factor (what employees do or don't do) is the biggest threat to information systems and assets. Until we address the human issue, technology alone cannot secure your organization. Humans will remain as the weakest link in the Security Chain.

This High-impact security awareness training addresses these issues. It ensures that your users are aware that they are a target; it motivates and changes behavior by teaching them how to use technology securely and ensures your organization need remains compliant. In addition, by teaching your users the indicators of compromise and how to report incidents, you go beyond just prevention and begin developing human sensors, creating a far more resilient organization.

With Industry 4.0, we connect people, process, technology, and machinery together and it becomes very important to make sure all users are cyber security aware. Otherwise, we may need to face many hackings across our industry.


PREREQUISITE

For all users who use internet, computers, mobile phones and social media. No technical jargons – Suitable for all

AUDIENCE

For all users who use internet, computers, mobile phones and social media. No technical jargons – Suitable for all

COURSE OBJECTIVE

• Understand the Basics of Security and Attack Lifecycle

• Understand the Latest Attacks in the wild with Live Demos instead of boring slides

• Understand how hackers’ fish your data and use it against you and how not to fall a victim

• Understand the importance of Strong and Unique passwords

• Understand Email and Messaging App Attacks and its Security

• Understand Wireless Attacks and Dangers of Free Wi-Fi spots and how to be vigilant

• Understand the Mobile devices Security

LEARNING OUTCOME

• Attendees will learn basics of Security and understand about Vulnerabilities and how defence technologies like Anti-Virus, Firewall work;

• Attendees will understand how all the Latest Attacks are carried out with DEMOS. This will help the attendees to be more aware on the current threats and Risks;

• Attendees will learn on how hackers manipulate and turn their mind and data against them for a successful attack.

• Attendees will also learn on different social engineering attacks including Facebook based attacks with DEMOS and Best practices on how to be aware and secure from these attacks;

• Attendees will learn on importance of Strong Passwords and how wrong password usage opens up for data theft resulting in Identity theft and compromise with DEMOS.

• Attendees will also learn the best practices for Password and how to create and remember Strong passwords without sticking the passwords on the Monitor or keyboard;

• Attendees will learn on attacks via EMAIL and Messaging applications with DEMOS. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine;

• Attendees learn on how Hackers compromise devices thru WiFi with DEMOS and how to secure office and personal devices from Hackers; and

• Attendees will learn the necessity of Security on Mobile devices and how hackers hack your mobile devices and a sample Android Malware with DEMOs.

• Attendees will also learn the security best practices for the mobile devices.


METHODOLOGY

This program will be conducted with interactive lectures, PowerPoint presentations, discussions, and practical exercises

Expand All

Modules

Module 1: Introduction: Anatomy of an Attack

Objective: Understand the Basics of Security and Attack Lifecycle

Outcome: Attendees will learn on basics of Security, Hacking attacks and understand about Vulnerabilities and Exploits and Why defence technologies like Anti-Virus, Firewall, IPS & IDS is not enough.

• What is Security

• Vulnerabilities & O-Days

• Attack life Cycle

• Hack Value: how much hacker makes by selling your passwords and data?

• Threats Vs. Risks

• Why Perimeter defenses are failing?

• Why Anti-Virus is not enough?


Module 2: Latest Attack Trends: 100% Hacking Demo

Objective: Understand the Latest Attacks in the wild

Outcome: Attendees will learn on all the Latest Attacks and how these attacks are carried out with DEMOs. This will help the attendees to be more aware on the current threats and Risks.

• Mobile Phone Malwares

• Web Attacks

• Business Email Compromise (BEC)

• Ransomware

• Advanced Persistent Threat

• Malvertising

• Identity Theft

• Whatsapp Image Attack


Module 3: Social Engineering Attacks: 100% Hacking Demo

Objective: Understand how hackers Phish your data from you and use it against you.

Outcome: Attendees will learn on how hackers manipulate and turn their mind and data against them for a successful attack. Attendees will also learn on different social engineering attacks including Facebook based attacks with DEMOS and Best practices on how to be aware and secure from these attacks.

• Drive by Download Attack with Java

• USB / File attachment Attacks

• Phone Call & Sweet Talking

• Facebook and social Media based attacks

• Best Practices for Safer Social Media Usage for Adults and Kids


Module 4: Email & Messaging Security: 100% Hacking Demo

Objective: Understand the importance of Strong and Unique passwords

Outcome: Attendees will learn on importance of Strong Passwords and how wrong password usage opens up for data theft resulting in Identity theft and compromise with DEMOS.

Attendees will also learn the best practices for Password and how to create and remember Strong passwords without sticking the passwords on the Monitor or keyboard.

• What is strong Password? Why password must be changed at least once in 90 days?

• Why u should not use same password in more than 1 web application?

• Best Practices for Password Management & Privacy


Module 5: Email & Messaging Security

Objective: Understand Email and Messaging App Security and Attacks

Outcome: Attendees will learn on attacks via EMAIL and Messaging applications with DEMOS. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine.

• Email Spoofing

• Phishing

• Disposable Emails

• WhatsApp, Telegram and similar Messaging Systems security

• Best Practices for Email Security

• Best Practices for Messaging Software


Module 6: Mobile Security: 100% Hacking Demo

Objective: Understand Wireless Attacks and Dangers of Free Wi-Fi spots

Outcome: Attendees will learn the different Wireless encryption methods and their weaknesses. Attendees learn on how Hackers compromise your devices thru Wi-Fi with DEMOS and how to secure office and personal devices from Hackers.

• Why Public Wi-Fi and Free hotspots are dangerous?

• Sniffing and MiTM attacks on Wi-Fi

• How to secure office and house Wi-Fi


Module 7: Mobile Security

Objective: Understand the Mobile devices Security and Fake Games and Malwares

Outcome: Attendees will learn the necessity of Security on Mobile devices and how hackers hack your mobile devices and a sample Android Malware with DEMOs. Attendees will also learn the security best practices for the mobile devices.

• Jail Breaking & Rooting : Why its disaster?

• DO you need Antivirus on a Mobile device?

• How hackers hack your phone and control it?

• A Sample Android Malware

• Security best practices for Mobile


Clement Arul

Clement Arul

A professional who believes that adaptability of security is directly equal to the affordability of security products, services and trainings. Started creating security products, services and trainings and certifications that are affordable as well as be part of the team in creation Nation Cyber Security Frameworks.Clement is also a two-time recipient award of National Award from Govt of Malaysia: Cyber Security Professional of the Year in 2017 and 2014 as well as a three-time Regional Award winner of Cyber Security Professional of the Year Asia and APAC in 2020, 2019 and 2017. He was also awarded as APAC Cyber Security Educator of the Year in 2020 and 2019. Read More

Course Reviews

No Remarks

0

0 Ratings