Course Description

More than ever, individuals and organizations need to protect themselves against online threats. The objective of this course is to raise awareness among employers and employees about emerging IT threats and attacks. Nowadays, uninformed employees can be easily victims to different types of threats. Today’s threats go much beyond the scope of conventional forms of attacks such as viruses and trojans but extend to other sophisticated forms of malware which encompass spear phishing attacks, business email compromise, social engineering attacks, identity thefts, cryptojacking and ransomware attacks. Awareness is the key to prevention of different types of attacks and protection of corporate data and Intellectual Property. In 2022, security awareness poses a fundamental layer of security in addition to other layers of security already implemented by organizations.

Summary

Part 1: The new cybersecurity landscape

• Understand how the cybersecurity landscape is evolving
• The latest cyber attacks trends from industry reports
• Cybercrime statistics
• Components of a cyber risk

Part 2: Malware types

• Understand the different types of malicious software
• The latest ransomware attacks
• Preferred vectors of cyber attacks

Part 3: Email phishing attacks

• Social engineering techniques
• Email as a preferred vector of attack
• Types of phishing attacks – Email phishing, Spear phishing, Whaling, Smishing, Vishing
• Techniques to identify sophisticated phishing emails
• Business email compromise

Part 4: Passwords

• Understanding password complexity vs password length
• Passphrase vs Passwords
• Creating secure authentication and know when your password is compromised

Part 5: 10 ways to protect your organization and its data

• Multi factor authentication – Creating secure authentication using 2FA, 2SV or MFA
• Software patching
• Identifying sophisticated attacks using fake URLS
• Detect potentially infected attachments
• Securing your data over public networks
• Securing mobile devices
• Protecting privacy online
• Learn how encryption can protect your data
• Protect your online privacy
• Protect from ransomware and other sophisticated attack

Topics Covered

  • Part 1: The new cybersecurity landscape
  • Part 2: Malware types
  • Part 3: Email phishing attacks
  • Part 4: Passwords
  • Part 5: 10 ways to protect your organization and its data