Online Threats and Information Security Awareness
INTRODUCTION:
Information & Communication Technology has become an integral part of our day to day life. It has changed the way we connect with friends, find jobs, find matches for marrying, run businesses, play games, do shopping and so on. With the cheap availability of broadband and smartphones, almost everyone has access to the cyber space, connecting virtually to millions of online users across the globe. Increasing use of cyber space has also made us vulnerable to cyber crime threats. A minor lapse/negligence in managing our digital life can open the doors for cyber crimes and hence can lead to financial loss, damage to reputation, harassment etc. So, we must be vigilant and careful while connecting digitally to the outside world whether for financial transactions, social networking, playing games or searching things on the internet etc.
COURSE OVERVIEW:
This Course shall introduce delegates to threats that they are exposed to while using the Internet and Mobile phone systems at home and in the work place. Delegates will be taken through the dos and donts on the cyber space because it is full of crooks and criminals out there whose aim is to fraudulently obtain important and private information from the organization or the subject without his or her permission. Cases of financial fraud, identity theft, harassment, and other illegal activities are on the increase at an exponential pace world wide. Africa is not left behind in this race, With the proliferation of wireless gadgets and sensors in every street, work place, supermarket, Airports and on the road. Citizens and companies are vulnerable to cyber attacks from many corners.
Billions of dollars are stolen every year by cyber fraudsters. Financial institutions and banks report billions dollar losses to these smart crooks who use all manner of gadgets to obtain financial data of customers and steal their hard earned money. It is therefore critical that people and organizations are made aware of cyber threats and how to counteract these threats at home, at work place or while shopping. The course shall equip delegates with the tools that will protect them and their systems from cyber threats and attacks. Delegates will do live exercises on their
cell phones and laptop computers in order to get hands on experience on cyber hygiene.
TARGET AUDIENCE:
This course is meant for all private citizens, employees, organizations as well as educational institutions, law enforcement agencies, and security firms.
PREREQUISITES: None
Mode of Training:
The course shall be conducted with PowerPoint presentations, group exercises, quizzes, demonstration videos, case studies as well as
sharing of experiences from delegates. There will be hands on practicals on security, password management, data safety, online hacks, antivirus-es,
and ,cyber safety tools.
Module Objectives:
- To understand various types of cyber-attacks and cyber-crimes
- To learn threats and risks within context of the cyber security
- To have an overview of the cyber laws & concepts of cyber forensics
- To study the defensive techniques against these attacks
Course Modules:
- Introduction to Cyber Security
- Cyber Security Terminology
- Cyber Frauds
- Cyber Hygiene (DNS-Security)
- Rules for Cellphone Protection
- Essentials of Cyber hygiene Readiness
- The 7 Layers of Cyber Security
- Steps to improve Cyber Security
- Security steps to stay safe on public and free WiFi Networks
- Safe use of Social Media
- How to detect and Block Cyber criminals activities
- Safe data storage in the Cloud
- Encryption techniques and software
- Ten important tips to a healthy cyber environment
- Course Test
Day
Morning Session 9 AM to 1 PM
Afternoon Session 2 PM to 4 PM
Day 1
Introductiion to Cyber Security
Cyber Security Terminology
Cyber threats and Frauds
Day 2
Cyber Hygiene (DNS-Security)
Rules of Cellphone use and protection
Essentials of Cyber Readiness
Exercises on safe cellphone setup
Day 3
The 7 Layers of Cyber Security
Steps to improve Cyber Security
Steps to stay safe on public and free WiFi
Exercises on safe WiFi device setup (laptop, PDA,Cellphone)
Day 4
Safe use of Social Media
How to detect and Block Cyber criminals activities
Safe data storage in cloud
Exercises on cloud storage
Day 5
Encryption techniques and software
Ten important tips to a healthy and hygienic cyber environment`
Test
Excursion and closingÂ