Certified Security Aware User | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

Certified Security Aware User

  • Public Class Icon
    Public Class
    • HRDF SBL Claimable
    • Lunch & refreshment provided
    • Certificate of Attendance available
    Starting From
    RM 900.00
    1 Days
  • Private Class Icon
    Private Class
    • All of our private classes are customized to your organization's needs.

      Click on the button below to send us your details and you will be contacted shortly.
    1 Days

Course Details

Expand All

As Clint Eastwood once said, "If you want a guarantee, buy a toaster." The only secure system is one that's unplugged, turned off, and in a locked room. Since it's not practical to leave our systems turned off, we need to understand the risks to our systems and prepare ourselves to defend them. Preparation begins with understanding — and that's where awareness comes in.


With all the news stories about hackers, botnets, and breaches involving personal information, it's easy for the security message to sound over-used and tired. It's easy for people to say, "It won't happen here." Yet, studies and surveys repeatedly show that: the human factor (what employees do or don't do) is the biggest threat to information systems and assets.

Most organizations have invested in myriad of security technologies to protect their infrastructure and data, putting in place solutions such as Firewalls, IPS/IDS, Encryptions and many more. However, many of these same organizations have failed to address the human element. People, just like computers, store, process and transfer highly valuable information. Yet people remain highly insecure, since so little has been done to educate them. As a result, cyber attackers are actively targeting the human element. Until you address the human issue, technology alone cannot secure your organization. Humans are the weakest link in the IT Security Chain.

High-impact security awareness training addresses these issues. It ensures that your users are aware that they are a target; it motivates and changes behavior by teaching them how to use technology securely and ensures your organization remains compliant. In addition, by teaching your users the indicators of compromise and how to report incidents, you go beyond just prevention and begin developing human sensors, creating a far more resilient organization.

This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises

Modules

Expand All

Objective: Understand the Basics of Security and Attack Lifecycle

Outcome : Attendees will learn on basics of Security, Hacking attacks and understand about Vulnerabilities and Exploits and Why defence technologies like Anti-Virus, Firewall, IPS & IDS is not enough.
• What is Security
• Vulnerabilities & O-Days
• Attack life Cycle
• Hack Value : how much hacker makes by selling your passwords and data ?
• Threats Vs. Risks
• Why Perimeter defenses are failing?
• Why Anti-Virus is not enough?

Objective: Understand the Latest Attacks in the wild

Outcome : Attendees will learn on all the Latest Attacks and how these attacks are carried out with DEMOs. This will help the attendees to be more aware on the current threats and Risks.

• Business Email Compromise (BEC)

• Ransomware

• Advanced Persistent Threat

• Malvertising

• Mobile Malwares

• Web Attacks

• Identity Theft

• Microsoft Office Macro & PowerShell based attacks


Objective : Understand how hackers Phish your data from you and use it against you.

Outcome : Attendees will learn on how hackers manipulate and turn their mind and data against them for a successful attack. Attendees will also learn on different social engineering attacks including Facebook based attacks with DEMOS and Best practices on how to be aware and secure from these attacks.

• Java Applet Attack Vectors

• Infectious Media Generator

• Phone Call & Sweet Talking

• Facebook and social Media based attacks

• Best Practices for Safer Social Media Usage.


Objective : Understand Email and Messaging App Security and Attacks

Outcome : Attendees will learn on attacks via EMAIL and Messaging applications with DEMOS. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine.

• Email Spoofing & Phishing

• Disposable Emails

• WhatsApp, Telegram and similar Messaging Systems security

• Strong Passwords

• Best Practices for Email Security

• Best Practices for Messaging Software


Objective : Understand Wireless Attacks and Dangers of Free Wifi spots

Outcome : Attendees learn on how Hackers compromise your devices thru WiFi with DEMOS and how to secure office and personal devices from Hackers.

• Why Public Wifi and Free hotspots are dangerous?

• Sniffing and MiTM attacks on Wifi

• How to secure office and house Wifi


Objective : Understand the Mobile devices Security and Fake Games and Malwares

Outcome : Attendees will learn the necessity of Security on Mobile devices and how hackers hack your mobile devices with DEMOs. Attendees will also learn the security best practices for the mobile devices.

• Jail Breaking & Rooting : Why its disaster ?

• DO you need Antivirus on a Mobile device ?

• How hackers hack your phone and control it ?

• A Sample Android Malware

• Security best practices for Mobile


Trainers

See All
Reset

Reviews

0
based on 0 ratings reviews