What Am I Going To Get Out Of This Course?
Media reports of security incidents have become as commonplace as the weather forecast, and over the past 12 months virtually every industry sector across the globe has been hit by some type of cyber threat.
This Cyber Security course is developed by our Core group of Information Security professionals with over 20 years of experience in providing IT Security Consultation, Vulnerability Assessments, Penetration Tests, Ethical Hacking, Security Audits, Security Posture Assessments, and Disaster Recovery Consultations led by National Cyber Security Award Winning Professional
At the end of the course, participants will understand the importance of cyber security, the latest trends in cyber attacks, how hackers fish data from you and use it against you as well as how to safe guard yourself and your organization against such cyber threats.
Anatomy of an Attack
Learners will learn on basics of Security, Hacking attacks and understand about Vulnerabilities and Exploits and how defence technologies like Anti-Virus, Firewall, IPS & IDS work.
Latest Attack Trends
Learners will learn on all the Latest Attacks and how these attacks are carried out with DEMOS. This will help the attendees to be more aware on the current threats and Risks.
Social Engineering Attacks
Learners will learn on how hackers manipulate and turn their mind and data against them for a successful attack. Attendees will also learn on different social engineering attacks including Facebook based attacks with DEMOS and Best practices on how to be aware and secure from these attacks.
Password Management & Security
Learners will learn on importance of Strong Passwords and how wrong password usage opens up for data theft resulting in Identity theft and compromise with DEMOS. Attendees will also learn the best practices for Password and how to create and remember Strong passwords without sticking the passwords on the Monitor or keyboard.
Email & Messaging Security
Learners will learn on attacks via EMAIL and Messaging applications with DEMOS. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine.
Learners will learn the different Wireless encryption methods and their weaknesses. Attendees learn on how Hackers compromise your devices thru WiFi with DEMOS and how to secure office and personal devices from Hackers.
Learners will learn the necessity of Security on Mobile devices and how hackers hack your mobile devices and a sample Android Malware with DEMOs. Attendees will also learn the security best practices for the mobile devices.