$425.98 – $532.07

16 Hours Cybersecurity Awareness Training Course in Dublin

Event Information

Share this event

Date and Time

Location

Location

IT Training Center

Dublin

Ireland

View Map

Refund Policy

Refund Policy

Contact the organizer to request a refund.

Eventbrite's fee is nonrefundable.

Event description
16 Hours Cybersecurity Awareness Training course is being delivered from October 27, 2020 - November 19, 2020 US Pacific Time.

About this Event

This event has been UPDATED since it was first published. View the UPDATED & Detailed Cybersecurity Awareness Training course for beginners Information here.

16 Hours Cybersecurity Awareness Training course is Instructor-led and guided and is being delivered from October 27, 2020 - November 19, 2020 for 16 Hours over 4 weeks, 8 sessions, 2 sessions per week, 2 hours per session.

  • Instructor-led and guided training
  • Practical Hands-On, Highly Interactive training
  • This course will be taught in English language
  • All Published Ticket Prices are in US Dollars

16 Hours Cybersecurity Awareness Training Course Schedule

Features and Benefits

  • 16 Hours, 8 sessions, 4 weeks of total Instructor-led and guided training
  • Training material, instructor handouts and access to useful resources on the cloud provided
  • Practical Hands-on Lab exercises provided
  • Actual code and scripts provided
  • Real-life Scenarios

Course Objectives

  • Awareness of the latest terminologies related to cyber security.
  • Assisting in developing a strategic view on addressing cyber security risks.
  • Building a practical perspective to comprehend the possible impacts of such risks.
  • Enabling the participants to provide appropriate direction and necessary cyber security context-driven oversight to protect their environments within their organizations.

Prerequisites

Basic knowledge of :

  • Computer System
  • Internet

Who can take this course?

  • This course is specifically designed for computer users who use the internet to extensively to work, study and play.

Course Outline

1. Who is a Hacker?

  • Why People Hack?
  • What people Hack?
  • What is information?
  • How much worth my Information is?
  • Types of Hackers
  • Approach of a Hacker
  • Steps in Hacking

2. Information gathering Techniques (How to protect your information?)

  • How Hackers gather information about us?
  • Does everybody know about you?
  • Where do they get it? (Demo)
  • Network scanning & its tools (Demo)
  • What is Google and how does it work?
  • Google Hacking (Demo)
  • Accessing Public Cameras
  • How can Google hacking help an Ethical Hacker? (Demo)

3. Foundations of Security

  • Security Incident
  • Why Security?
  • Potential Losses Due to Security Attacks
  • Elements of Security
  • The Security, Functionality, and Ease of Use Triangle
  • Fundamental Concepts of Security
  • Layers of Security
  • Security Risks to Home Users
  • What to Secure?
  • Benefits of Computer Security Awareness
  • Basic Computer Security Checklist

4. Basics of Internet & Networking

  • What is a Network?
  • Types of network – LANs, WANs & WLANs
  • What is Internet?
  • History of the Internet
  • Basic Structure
  • What is a Server?
  • What is an IP Address?
  • What is a domain name?
  • What is a browser?
  • Client-Server Relationship Model
  • What is a port?

5. Securing Network Connections

  • Home Network
  • Network Devices
  • Steps for Home Networking
  • Using the Network with Windows 7
  • Using the Network with MAC OS X
  • Securing Network Connections
  • Network Adapters
  • Troubleshooting with Network Adapters

6. Desktop/PC Security, Antivirus & IDS

  • Types of viruses
  • What are anti-viruses?
  • How they detect a virus?
  • What is firewall?
  • What are Trojan & Spywares?

7. Passwords Security

  • Types of Passwords
  • Build a Strong Password
  • Password Encryption
  • Password Cracking (Password Recovery)
  • Protection from Password Cracking

8. Data Encryption

  • What Is Encryption?
  • Encryption Common Terminologies
  • Usage of Encryption
  • Types of Encryption
  • Symmetric vs. Asymmetric Encryption
  • Encryption Standards
  • Digital Certificates and how its Work
  • Digital Signature and how its Work
  • Cryptography Tools

9. Data Backup and Disaster Recovery

  • Data Backup
  • Types of Data Loss
  • What Files to Backup and How Often?
  • Windows Backup and Restore
  • MAC OS X Backup and Restore
  • Data Backup Tools
  • Data Recovery Tools
  • Physical Security

10. Internet Security

  • Browser Security
  • Internet Explorer Security & Privacy Settings
  • Mozilla Firefox: Security & Privacy Settings
  • Google Chrome Privacy and Security Settings
  • Instant
  • Instant Messaging Security Issues & Measures
  • Searching on the Web
  • Online Gaming Risks
  • Social Risks
  • Social Engineering
  • How the Malicious Users Make Money
  • Recognize Administrator Mode Risks
  • Child Online Safety
  • Risks Involved Online
  • Stealth Sites and Misleading URLs
  • Risks Involved in Social Networking Websites
  • Chat Rooms

11. Securing Online Transactions

  • Online Shopping
  • Online Banking
  • Credit Card Payments
  • Credit Card Frauds
  • Guidelines for Ensuring Credit Card Safety
  • Securing Online Transactions
  • Online Payment Services
  • Choosing a Secure Online Payment Service
  • SSL and the Padlock Symbol
  • What Does the SSL Show?
  • Identifying a Trustworthy Website
  • Identifying an Untrustworthy Website
  • Rating Icons

12. Web Security

  • How the web really works
  • Rattling the Locks
  • Looking through Tinted Windows – SSL
  • Having someone else do it for you – Proxies
  • Top Ten Most Critical Web Application Vulnerabilities
  • Security Guidelines for Building Secure Web Applications
  • Reading and Viewing HTML at its Source
  • Proxy methods for Web Application Manipulation

13. Email Security

  • Introduction
  • How E-mail Works
  • Safe E-mail Usage
  • Spam, Phishing and Fraud
  • Attachment Security
  • Email Forging

14. Mobile Security

  • Introduction
  • Android Phone Security
  • What Apps can do to harm you?
  • Dos & Don’ts for Mobile Phones

15. Wireless Security

  • What is Wi-Fi?
  • What are public Wi-Fi?
  • Can someone sniff our passwords?
  • How to protect our self from Wi-Fi attacks?

16. Social Media Security

  • Introduction
  • Types of Social Media
  • Attacks on Social Media
  • Social Engineering Attacks
  • How to defend Facebook Account?

17. Cyber Abuse

  • What is cyber abuse?
  • Laws against Cyber Abuse
  • How to avoid cyber abuse

18. Cyber Laws

  • USA PATRIOT Act
  • Children’s Online Privacy Protection Act (COPPA)
  • The Digital Millennium Copyright Act
  • Highlights of DMCA
  • CAN-SPAM Act
  • Computer Misuse Act 1990
  • European Union Data Protection Directive (95/46/EC)
  • Data Protection Act 1998
Share with friends

Date and Time

Location

IT Training Center

Dublin

Ireland

View Map

Refund Policy

Contact the organizer to request a refund.

Eventbrite's fee is nonrefundable.

Save This Event

Event Saved