Cybe-Security-Awareness-Program

Cyber Security Awareness Program

With the recent focus of Government of India on digitizing transactions within the country, there is a huge impetus on cyber security being of primary importance for entire IT eco-system within the country. The information security requirements encompass all sectors of the Industry, including but not limited to, Government, BFSI, Manufacturing, Healthcare, Aviation, E-commerce, Retail, among others.

The cyber security requirements apart from being driven by risk have a large compliance driver. With cyber security becoming prime focus, the global compliance requirements have gained importance and are significantly stringent with controls built around enforcement and penalties for non-compliance.

Course Overview

The purpose of this workshop is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse participants into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering.

More importantly, the skills learnt from this workshop helps participants take the necessary steps to mitigate their security exposure.

This workshop will also explore the various means that an intruder has, to gain access to computer resources. It will investigate weaknesses by discussing the theoretical background behind, and whenever possible, actually performing the attack.

The learning objectives of the workshop are as follows:

  • Awareness on the latest terminologies related to cyber security.
  • Assisting in developing a strategic view on addressing cyber security risks.
  • Building a practical perspective to comprehend the possible impacts of such risks.
  • Enabling the participants to provide appropriate direction and necessary cyber security context-driven oversight to protect their environments within their organisations.

This three days’ workshop also aimed at providing a practical perspective of the various risks that an organization and user faces from the ever-active adversaries. It takes the participants through a step-by-step build-up of how the latest high-impact attacks are planned and launched.

Who Should Attend

This course is specifically designed for todays' computer users who uses the internet and the www extensively to work, study and play.

Course Duration

  • 18 Hours.

Course Content

Who is a Hacker?

  • Why People Hack?
  • What people Hack?
  • What is information?
  • How much worth my Information is?
  • Types of Hackers
  • Approach of a Hacker
  • Steps in Hacking

Information gathering Techniques (How to protect your information?)

  • How Hackers gather information about us?
  • Does everybody know about you?
  • Where do they get it? (Demo)
  • Network scanning & its tools (Demo)
  • What is Google and how does it work?
  • Google Hacking (Demo)
  • Accessing Public Cameras
  • How can Google hacking help an Ethical Hacker? (Demo)

Foundations of Security

  • Security Incident
  • Why Security?
  • Potential Losses Due to Security Attacks
  • Elements of Security
  • The Security, Functionality, and Ease of Use Triangle
  • Fundamental Concepts of Security
  • Layers of Security
  • Security Risks to Home Users
  • What to Secure?
  • Benefits of Computer Security Awareness
  • Basic Computer Security Checklist

Basics of Internet & Networking

  • What is a Network?
  • Types of network – LANs, WANs & WLANs
  • What is Internet?
  • History of the Internet
  • Basic Structure
  • What is a Server?
  • What is an IP Address?
  • What is a domain name?
  • What is a browser?
  • Client-Server Relationship Model
  • What is a port?

Securing Network Connections

  • Home Network
  • Network Devices
  • Steps for Home Networking
  • Using the Network with Windows 7
  • Using the Network with MAC OS X
  • Securing Network Connections
  • Network Adapters
  • Troubleshooting with Network Adapters

Desktop/PC Security, Antivirus & IDS

  • Types of viruses
  • What are anti-viruses?
  • How they detect a virus?
  • What is firewall?
  • What are Trojan & Spywares?

Passwords Security

  • Types of Passwords
  • Build a Strong Password
  • Password Encryption
  • Password Cracking (Password Recovery)
  • Protection from Password Cracking

Data Encryption

  • What Is Encryption?
  • Encryption Common Terminologies
  • Usage of Encryption
  • Types of Encryption
  • Symmetric vs. Asymmetric Encryption
  • Encryption Standards
  • Digital Certificates and how its Work
  • Digital Signature and how its Work
  • Cryptography Tools

Data Backup and Disaster Recovery

  • Data Backup
  • Types of Data Loss
  • What Files to Backup and How Often?
  • Windows Backup and Restore
  • MAC OS X Backup and Restore
  • Data Backup Tools
  • Data Recovery Tools
  • Physical Security

Internet Security

  • Browser Security
  • Internet Explorer Security & Privacy Settings
  • Mozilla Firefox: Security & Privacy Settings
  • Google Chrome Privacy and Security Settings
  • Instant
  • Instant Messaging Security Issues & Measures
  • Searching on the Web
  • Online Gaming Risks
  • Social Risks
  • Social Engineering
  • Protection Schemes,Cyber Prostitution,and Virtual Mugging
  • How the Malicious Users Make Money
  • Recognize Administrator Mode Risks
  • Child Online Safety
  • Risks Involved Online
  • Stealth Sites and Misleading URLs
  • Child Pornography, Grooming, and Cyberbullying
  • Risks Involved in Social Networking Websites
  • Chat Rooms

Securing Online Transactions

  • Online Shopping
  • Online Banking
  • Credit Card Payments
  • Credit Card Frauds
  • Guidelines for Ensuring Credit Card Safety
  • Securing Online Transactions
  • Online Payment Services
  • Choosing a Secure Online Payment Service
  • SSL and the Padlock Symbol
  • What Does the SSL Show?
  • Identifying a Trustworthy Website
  • Identifying an Untrustworthy Website
  • Rating Icons

Web Security

  • How the web really works
  • Rattling the Locks
  • Looking through Tinted Windows – SSL
  • Having someone else do it for you – Proxies
  • Top Ten Most Critical Web Application Vulnerabilities
  • Security Guidelines for Building Secure Web Applications
  • Reading and Viewing HTML at its Source
  • Proxy methods for Web Application Manipulation

Email Security

  • Introduction
  • How E-mail Works
  • Safe E-mail Usage
  • Spam, Phishing and Fraud
  • Attachment Security
  • Email Forging

Mobile Security

  • Introduction
  • Android Phone Security
  • What Apps can do to harm you?
  • Dos & Don’ts for Mobile Phones

Wireless Security

  • What is Wi-Fi?
  • What are public Wi-Fi?
  • Can someone sniff our passwords?
  • How to protect our self from Wi-Fi attacks?

Social Media Security

  • Introduction
  • Types of Social Media
  • Attacks on Social Media
  • Social Engineering Attacks
  • How to defend Facebook Account?

Cyber Abuse

  • What is cyber abuse?
  • Laws against Cyber Abuse
  • How to avoid cyber abuse

Cyber Laws

  • USA PATRIOT Act
  • Children’s Online Privacy Protection Act (COPPA)
  • The Digital Millennium Copyright Act
  • Highlights of DMCA
  • CAN-SPAM Act
  • Computer Misuse Act 1990
  • European Union Data Protection Directive (95/46/EC)
  • Data Protection Act 1998