Online Threats and Information Security Awareness

INTRODUCTION:
Information & Communication Technology has become an integral part of our day to day life. It has changed the way we connect with friends, find jobs, find matches for marrying, run businesses, play games, do shopping and so on. With the cheap availability of broadband and smartphones, almost everyone has access to the cyber space, connecting virtually to millions of online users across the globe. Increasing use of cyber space has also made us vulnerable to cyber crime threats. A minor lapse/negligence in managing our digital life can open the doors for cyber crimes and hence can lead to financial loss, damage to reputation, harassment etc. So, we must be vigilant and careful while connecting digitally to the outside world whether for financial transactions, social networking, playing games or searching things on the internet etc.

COURSE OVERVIEW:
This Course shall introduce delegates to threats that they are exposed to while using the Internet and Mobile phone systems at home and in the work place. Delegates will be taken through the dos and donts on the cyber space because it is full of crooks and criminals out there whose aim is to fraudulently obtain important and private information from the organization or the subject without his or her permission. Cases of financial fraud, identity theft, harassment, and other illegal activities are on the increase at an exponential pace world wide. Africa is not left behind in this race, With the proliferation of wireless gadgets and sensors in every street, work place, supermarket, Airports and on the road. Citizens and companies are vulnerable to cyber attacks from many corners. 

Billions of dollars are stolen every year by cyber fraudsters. Financial institutions and banks report billions dollar losses to these smart crooks who use all manner of gadgets to obtain financial data of customers and steal their hard earned money. It is therefore critical that people and organizations are made aware of cyber threats and how to counteract these threats at home, at work place or while shopping. The course shall equip delegates with the tools that will protect them and their systems from cyber threats and attacks. Delegates will do live exercises on their
cell phones and laptop computers in order to get hands on experience on cyber hygiene. 

TARGET AUDIENCE:
This course is meant for all private citizens, employees, organizations as well as educational institutions, law enforcement agencies, and security firms.

PREREQUISITES: None

Mode of Training:
The course shall be conducted with PowerPoint presentations, group exercises, quizzes, demonstration videos, case studies as well as
sharing of experiences from delegates. There will be hands on practicals on security, password management, data safety, online hacks, antivirus-es,
and ,cyber safety tools.

Module Objectives:

  • To understand various types of cyber-attacks and cyber-crimes 
  • To learn threats and risks within context of the cyber security
  • To have an overview of the cyber laws & concepts of cyber forensics
  • To study the defensive techniques against these attacks

Course Modules:

  • Introduction to Cyber Security
  • Cyber Security Terminology
  • Cyber Frauds
  • Cyber Hygiene (DNS-Security)
  • Rules for Cellphone Protection
  • Essentials of Cyber hygiene Readiness
  • The 7 Layers of Cyber Security
  • Steps to improve Cyber Security
  • Security steps to stay safe on public and free WiFi Networks
  • Safe use of Social Media
  • How to detect and Block Cyber criminals activities
  • Safe data storage in the Cloud
  • Encryption techniques and software
  • Ten important tips to a healthy cyber environment
  • Course Test
Course Time Tab

Day

Morning Session 9 AM to 1 PM

Afternoon Session 2 PM to 4 PM

Day 1

Introductiion to Cyber Security
Cyber Security Terminology

Cyber threats and Frauds

Day 2

Cyber Hygiene (DNS-Security)

Rules of Cellphone use and protection

Essentials of Cyber Readiness
Exercises on safe cellphone setup

Day 3

The 7 Layers of Cyber Security
Steps to improve Cyber Security

Steps to stay safe on public and free WiFi

Exercises on safe WiFi device setup (laptop, PDA,Cellphone)

Day 4

Safe use of Social Media
How to detect and Block Cyber criminals activities

Safe data storage in cloud
Exercises on cloud storage

Day 5

Encryption techniques and software
Ten important tips to a healthy and hygienic cyber environment`

Test

Excursion and closing 

Scroll to Top