General User Awarenes Training

Who should attend?

This course is an general user awareness Security Training  for  those want to secure   themselves  from unwanted attacks.  

Information Security ,Ethical hacking & Case Studies
  • Role of Information Security in Today’s Era
  • Importance of Information Security 
  • Basic Terminologies
  • Hack Value
  • Zero Day – Vulnerability / Attack
  • CIA Triad Corporate trade
  • Case Studies of Recent Hacks
Hacking Phases & Countermeasures
  • Phases of Hacking
  • Reconnaissance
  • Scanning
  • Gaining Access
  • Privilege Escalation
  • Maintaining Access
  • Clearing Tracks
  • Setting Backdoors
  • Social Engineering & Techniques
  • Phishing
  • SMShing
  • Whaling
  • Dumpster Diving
  • Shoulder Surfing
  • Tailgating / Piggy-backing
  • Disgruntled Employees
  • Identity Theft
  • Unauthorised Access
  • Shadow IT
  • Credential harvesting / Password guessing
  • Preventive measures
Malware Essentials
  • Malware, Ransomware & Key-loggers
  • What is malware
  • Types of malware
  • Virus
  • Worms
  • Trojans
  • Rootkits
  • Adware
  • Spyware
  • Crimeware
  • What is ransomware
  • What are key-loggers
  • Fly-by-downloaders
  • Droppers
  • Advance Persistent Threats
  • Preventive Measures
  • Patch management
  • AV updates
  • Back-up
Enterprise Procedural Security
  • Security Best Practices
  • Password guidelines
  • Internet usage
  • Email usage
  • Email etiquettes
  • Identifying phishing emails
  • Dealing with offensive emails
  • 2-Factor / Multi-factor authentication
  • Mobile device security threats & prevention
  • Portable device / media security threats & prevention
  • Clear desk
  • Handling / Disposal of sensitive data (print/digital)
  • Data classification & labelling
  • Storage – encryption / hashing
  • Disposal
  • Physical Security
  • Access controls
  • Visitor management