CSAU: Certified Security Aware User | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

CSAU: Certified Security Aware User


Format What’s this?
Starting From
RM 900.00
  1. 1 Days
  1. HRDF SBL Claimable
  2. Lunch & refreshment provided
  3. Certificate of Attendance available
Starting From
RM 900.00
  1. 1 Day with 08 hours per day
  1. Thu 02 Jul 09:00 - Thu 02 Jul 17:00
  1. HRDF SBL Claimable
  2. Certificate of Attendance available
  1. 1 Days
  1. All of our private classes are customized to your organization's needs.
  2. Click on the button below to send us your details and you will be contacted shortly.

CSAU: Certified Security Aware User


As Clint Eastwood once said, "If you want a guarantee, buy a toaster." The only secure system is one that's unplugged, turned off, and in a locked room. Since it's not practical to leave our systems turned off, we need to understand the risks to our systems and prepare ourselves to defend them. Preparation begins with understanding — and that's where awareness comes in.

With all the news stories about hackers, botnets, and breaches involving personal information, it's easy for the security message to sound over-used and tired. It's easy for people to say, "It won't happen here." Yet, studies and surveys repeatedly show that: the human factor (what employees do or don't do) is the biggest threat to information systems and assets.

Most organizations have invested in myriad of security technologies to protect their infrastructure and data, putting in place solutions such as Firewalls, IPS/IDS, Encryptions and many more. However, many of these same organizations have failed to address the human element. People, just like computers, store, process and transfer highly valuable information. Yet people remain highly insecure, since so little has been done to educate them. As a result, cyber attackers are actively targeting the human element. Until you address the human issue, technology alone cannot secure your organization. Humans are the weakest link in the IT Security Chain.

High-impact security awareness training addresses these issues. It ensures that your users are aware that they are a target; it motivates and changes behavior by teaching them how to use technology securely and ensures your organization remains compliant. In addition, by teaching your users the indicators of compromise and how to report incidents, you go beyond just prevention and begin developing human sensors, creating a far more resilient organization.


This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises

Expand All


Module 1: Introduction : Anatomy of an Attack

Objective: Understand the Basics of Security and Attack Lifecycle

Outcome : Attendees will learn on basics of Security, Hacking attacks and understand about Vulnerabilities and Exploits and Why defence technologies like Anti-Virus, Firewall, IPS & IDS is not enough.
• What is Security
• Vulnerabilities & O-Days
• Attack life Cycle
• Hack Value : how much hacker makes by selling your passwords and data ?
• Threats Vs. Risks
• Why Perimeter defenses are failing?
• Why Anti-Virus is not enough?

Module 2: Latest Attack Trends : 100% Hacking Demo

Objective: Understand the Latest Attacks in the wild

Outcome : Attendees will learn on all the Latest Attacks and how these attacks are carried out with DEMOs. This will help the attendees to be more aware on the current threats and Risks.

• Business Email Compromise (BEC)

• Ransomware

• Advanced Persistent Threat

• Malvertising

• Mobile Malwares

• Web Attacks

• Identity Theft

• Microsoft Office Macro & PowerShell based attacks

Module 3: Social Engineering Attacks : 100% Hacking Demo

Objective : Understand how hackers Phish your data from you and use it against you.

Outcome : Attendees will learn on how hackers manipulate and turn their mind and data against them for a successful attack. Attendees will also learn on different social engineering attacks including Facebook based attacks with DEMOS and Best practices on how to be aware and secure from these attacks.

• Java Applet Attack Vectors

• Infectious Media Generator

• Phone Call & Sweet Talking

• Facebook and social Media based attacks

• Best Practices for Safer Social Media Usage.

Module 4: Email & Messaging Security : 100% Hacking Demo

Objective : Understand Email and Messaging App Security and Attacks

Outcome : Attendees will learn on attacks via EMAIL and Messaging applications with DEMOS. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine.

• Email Spoofing & Phishing

• Disposable Emails

• WhatsApp, Telegram and similar Messaging Systems security

• Strong Passwords

• Best Practices for Email Security

• Best Practices for Messaging Software

Module 5: Wireless Attacks : 100% Hacking Demo

Objective : Understand Wireless Attacks and Dangers of Free Wifi spots

Outcome : Attendees learn on how Hackers compromise your devices thru WiFi with DEMOS and how to secure office and personal devices from Hackers.

• Why Public Wifi and Free hotspots are dangerous?

• Sniffing and MiTM attacks on Wifi

• How to secure office and house Wifi

Module 6: Mobile Security : : 100% Hacking Demo

Objective : Understand the Mobile devices Security and Fake Games and Malwares

Outcome : Attendees will learn the necessity of Security on Mobile devices and how hackers hack your mobile devices with DEMOs. Attendees will also learn the security best practices for the mobile devices.

• Jail Breaking & Rooting : Why its disaster ?

• DO you need Antivirus on a Mobile device ?

• How hackers hack your phone and control it ?

• A Sample Android Malware

• Security best practices for Mobile

Clement Arul

Clement Arul

A professional who believes that adaptability of security is directly equal to the affordability of security products, services and trainings. Started creating security products, services and trainings and certifications that are affordable as well as be part of the team in creation Nation Cyber Security Frameworks.Clement is also a two-time recipient award of National Award from Govt of Malaysia: Cyber Security Professional of the Year in 2017 and 2014 as well as a three-time Regional Award winner of Cyber Security Professional of the Year Asia and APAC in 2020, 2019 and 2017. He was also awarded as APAC Cyber Security Educator of the Year in 2020 and 2019. Read More

Course Reviews

No Remarks


0 Ratings