Basic Concepts on Cyber Security
(3 Hours)
|
Understanding the importance of cyber security, Key terminology and concepts, Basic security principles (CIA triad - Confidentiality, Integrity, Availability, Non-repudiation.), Security Risks to Home Users; Current threat landscape, threat actors: Hackers, Insiders, Organized Crime, State-Sponsored, Hacktivists. Benefits of Computer Security, Awareness Financial and Reputational Cost and impact of cyber security breaches.
|
Securing Operating Systems
(3 Hours)
|
Threats to System Security, Windows Security Tools, Mobile Devices (Android), App permissions management, identifying malicious Apps. Desktop Devices (Windows), User account control (UAC), Group Policy, Using Windows Defender, Antivirus and Antimalware Software, Operating System Security Checklists
|
Malware and Antivirus
(3 Hours)
|
Most Dangerous Computer Viruses Evolution of malware, Viruses and worms, Trojan horses and backdoors, Ransom ware, Spyware, Key loggers and adware, Detection and prevention of malwares, Antivirus Security Checklist
|
Internet Security (3 Hours)
|
Ideas on Internet Security, Safe Browsing Habits, Safe download practices, Internet Explorer, Mozilla Firefox and Google Chrome Security Settings etc. Security and privacy controls on Social Networking Sites, Implementing 2FA/MFA
|
Security on Social
Networking Sites (3 Hrs.)
|
Ideas on Social Networking Sites, Top Social Networking Sites, Security Risks Involved in Social Networking Sites, Staying Safe on Facebook, Social Networking Security Checklist, Social Networking Security Checklist for Parents and Teachers, Detection and prevention of Phishing and spear phishing, social engineering techniques such as Pretexting, Baiting, Tailgating, Impersonation, Scamming & Bribery.
|
Securing Email Communications (3 Hrs.)
|
Email Security Threats, Email Security Checklist, Detecting Email hoaxes, scams and suspicious attachments, Phishing identification techniques etc.
|
Securing the Cloud
(3 Hrs.)
|
Shared Responsibility Model (cloud provider responsibilities vs. user responsibilities, compliance requirements), Data Protection in the Cloud, implementing access controls and Multi-Factor Authentication (MFA), Role Based Access Control (RBAC), Single Sign-on (SSO)
|
Securing Online Transactions
(3 Hrs)
|
Online Banking, Securing Online Transactions, Choosing a Secure Online Payment Service
Identifying a Trustworthy and an Untrustworthy Website, Online Transactions Security Checklist
|
Securing Mobile Devices
(3 Hrs.)
|
Mobile Device Security, Mobile Device Security Risks, Mobile Malware, Threats to Bluetooth Devices, Mobile Security Procedures, Mobile Security Tools and Mobile Phone Security Checklists etc.
|
Basic Concept of Blockchain and Cryptography
(3 Hrs.)
|
Introduction to Blockchain and its Origin, Why Blockchain is crucial and its objectives, Blockchain terminologies, Distinction between databases and block chain, Distributed Ledger, Understanding Blockchain ecosystem and structure, how block chain works, Types of block chain and Uses of Blockchain, Overview of cryptography, Concepts on Public key and Private Key and cipher etc.
|