Cyber Security Essentials

Course Overview/Objective

After completing this course participants will be able to-

 

  • Learn about the underlying principles of cybersecurity, as well as the changing landscape of cybersecurity threats and challenges.
  • Learn about two-factor authentication, strong password policies, and safe browsing techniques, among other crucial security measures.
  • Key cybersecurity information and habits to help create safer digital environments.
  • Basic Concepts on Cyber Security
  • Securing Operating Systems
  • Malware and Antivirus 
  • Internet Security
  • Security on Social Networking Sites
  • Securing Email Communications
  • Securing the Cloud
  • Securing Online Transactions
  • Securing Mobile Devices
  • Basic Concept of Blockchain and Cryptography 

 

Requirements

Graduate from any discipline

Must have knowledge in Computer Operation.

Course Project
N/A
Used Tools
Internet, As per Instructor
Course Outline

    Module & Hours

Details

Basic Concepts on Cyber Security 

(3 Hours)

Understanding the importance of cyber security, Key terminology and concepts, Basic security principles (CIA triad - Confidentiality, Integrity, Availability, Non-repudiation.), Security Risks to Home Users; Current threat landscape, threat actors: Hackers, Insiders, Organized Crime, State-Sponsored, Hacktivists. Benefits of Computer Security, Awareness Financial and Reputational Cost and impact of cyber security breaches.

Securing Operating Systems 

(3 Hours)

Threats to System Security, Windows Security Tools, Mobile Devices (Android), App permissions management, identifying malicious Apps. Desktop Devices (Windows), User account control (UAC), Group Policy, Using Windows Defender, Antivirus and Antimalware Software, Operating System Security Checklists

 

Malware and Antivirus 

(3 Hours)

Most Dangerous Computer Viruses Evolution of malware, Viruses and worms, Trojan horses and backdoors, Ransom ware, Spyware, Key loggers and adware, Detection and prevention of malwares, Antivirus Security Checklist

 

Internet Security (3 Hours)

 

Ideas on Internet Security, Safe Browsing Habits, Safe download practices, Internet Explorer, Mozilla Firefox and Google Chrome Security Settings etc. Security and privacy controls on Social Networking Sites, Implementing 2FA/MFA

 

Security on Social

Networking Sites (3 Hrs.)

 

Ideas on Social Networking Sites, Top Social Networking Sites, Security Risks Involved in Social Networking Sites, Staying Safe on Facebook, Social Networking Security Checklist, Social Networking Security Checklist for Parents and Teachers, Detection and prevention of Phishing and spear phishing, social engineering techniques such as Pretexting, Baiting, Tailgating, Impersonation, Scamming & Bribery.

 

Securing Email Communications (3 Hrs.)

Email Security Threats, Email Security Checklist, Detecting Email hoaxes, scams and suspicious attachments, Phishing identification techniques etc.

Securing the Cloud

 (3 Hrs.)

 

Shared Responsibility Model (cloud provider responsibilities vs. user responsibilities, compliance requirements), Data Protection in the Cloud, implementing access controls and Multi-Factor Authentication (MFA), Role Based Access Control (RBAC), Single Sign-on (SSO)

 

Securing Online Transactions

 (3 Hrs)

 

Online Banking, Securing Online Transactions, Choosing a Secure Online Payment Service

Identifying a Trustworthy and an Untrustworthy Website, Online Transactions Security Checklist

 

Securing Mobile Devices

(3 Hrs.)

 

Mobile Device Security, Mobile Device Security Risks, Mobile Malware, Threats to Bluetooth Devices, Mobile Security Procedures, Mobile Security Tools and Mobile Phone Security Checklists etc.

 

Basic Concept of Blockchain and Cryptography

 (3 Hrs.)

 

Introduction to Blockchain and its Origin, Why Blockchain is crucial and its objectives, Blockchain terminologies, Distinction between databases and block chain, Distributed Ledger, Understanding Blockchain ecosystem and structure, how block chain works, Types of block chain and Uses of Blockchain, Overview of cryptography, Concepts on Public key and Private Key and cipher etc.