This 12-unit course developed by the Read Academy, KSA incorporates a thorough overview of Cyber Security.
Behind every successful coder there is a successful de-coder – yes, that’s why hackers win. While Cryptology remains the science of studying & breaking the secrecy of the encryption processes etc, it the ‘motivation’ of the cyberpunks that is quintessential to the win best depicted in the Oscar winner ‘The Imitation Game’.
Welcome to the world of virtual reality wherein every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.
With our Cyber Security workshop participants will understand the different types of malware and security breaches. Develop effective prevention methods which will increase overall security. They will also understand the basic concepts associated with Cryptography, Hardware Security Modules, Key Management, different types of malware and security breaches, types of cyberattack and what a company needs to stay secure.
The course is offered in an online platform similar to an interactive textbook, featuring pre-recorded videos, quizzes and projects that give you the opportunity to gain new knowledge, learn new skills and demonstrate these through the completion of online assessment and skill evidence.
Those who successfully complete this course will be able to incorporate their learning into their current workplace and be formally recognised with a Certificate of Completion endorsed by theRead Academy.
Key Objectives Of The Course:
Understand different types of malware and security breaches
Know the types of cyber attacks to look out for
Develop effective prevention methods
Follow the suggested order or choose your own.
Designed to help you practice and apply the skills you learn
Highlight your new skills on your resume or LinkedIn.
Module One: Getting Started
The Parking Lot
Module Two: Cyber Security Fundamentals
What is Cyberspace
What is Cyber Security
Why is Cyber Security Important
What is a Hacker
Module Three: Types of Malware
Module Four: Cyber Security Breaches
Module Five: Types of Cyber Attacks
Denial of Service Attacks
Module Six: Prevention Tips
Craft a strong password
Download Attachments with Care
Question Legitimacy of Websites
Module Seven: Mobile Protection
No Credit Card Numbers
Don’t Save Passwords
No Personalized Contacts Listed
Module Eight: Social Network Security
Don’t Reveal Location
Keep Birthdate Hidden
Have Private Profile
Don’t Link Accounts
Module Nine: Prevention Software
Virtual Private Networks
Anti-Virus & Anti-Spyware
Module Ten: Critical Cyber Threats
Critical Cyber Threats
Module Eleven: Defense Against Hackers
Module Twelve: Wrapping up
Words from the Wise
Review of Parking Lot
Completion of Action Plans and Evaluations
All of these professional training resources are based on the most up-to-date body of knowledge and carefully selected by subject matter experts.