Our classroom training provides you the opportunity to interact with instructors and benefit from face-to-face instruction.
Cyber Security Training
VIRTUAL TRAINING
Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning.
CORPORATE TRAINING
Our Corporate training provides you the opportunity to interact with instructors and benefit from face-to-face instruction.
TRAINING HIGHLIGHTS
High quality training from Certified & Industry Experts
Earn 16 PDUs
Course Completion Certificates
Extensive documentation provided
Reimbursement guaranteed if the training is not satisfied
Our approach is both practical and inspirational. Our training is carefully designed and tested to develop the key skills and confidence needed while being highly participatory and fun
Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.
With our Cyber Security workshop, your participants will understand the different types of malware and security breaches. Develop effective prevention methods that will increase overall security. They will also understand the basic concepts associated with Cyber Security and what a company needs to stay secure.
Module One: Getting Started
- ● Icebreaker
- ● Housekeeping Items
- ● The Parking Lot
- ● Workshop Objectives
Module Two: Cyber security Fundamentals
- ● What is Cyberspace?
- ● What is Cyber security?
- ● Why is Cyber security Important?
- ● What is a Hacker?
- ● Case Study
Module Two: Review Questions
Module Three: Types of Malware
- ● Worms
- ● Viruses
- ● Spyware
- ● Trojans
- ● Case Study
Module Three: Review Questions
Module Four: Cyber Security Breaches
- ● Phishing
- ● Identity Theft
- ● Harassment
- ● Cyberstalking
- ● Case Study
Module Four: Review Questions
Module Five: Types of Cyber Attacks
- ● Password Attacks
- ● Denial of Service Attacks
- ● Passive Attack
- ● Penetration Testing
- ● Case Study
Module Five: Review Questions
Module Six: Prevention Tips
- ● Craft a Strong Password
- ● Two-Step Verification
- ● Download Attachments with Care
- ● Question Legitimacy of Websites
- ● Case Study
Module Six: Review Questions
Module Seven: Mobile Protection
- ● No Credit Card Numbers
- ● Place Lock on Phone
- ● Don’t Save Passwords
- ● No Personalized Contacts Listed
- ● Case Study
Module Seven: Review Questions
Module Eight: Social Network Security
- ● Don’t Reveal Location
- ● Keep Birthdate Hidden
- ● Have Private Profile
- ● Don’t Link Accounts
- ● Case Study
Module Eight: Review Questions
Module Nine: Prevention Software
- ● Firewalls
- ● Virtual Private Networks
- ● Anti-Virus & Anti-Spyware
- ● Routine Updates
- ● Case Study
Module Nine: Review Questions
Module Ten: Critical Cyber Threats
- ● Critical Cyber Threats
- ● Cyber terrorism
- ● Cyberwarfare
- ● Cyberespionage
- ● Case Study
Module Ten: Review Questions
Module Eleven: Defense Against Hackers
- ● Cryptography
- ● Digital Forensics
- ● Intrusion Detection
- ● Legal Recourse
- ● Case Study
Module Eleven: Review Questions
Module Twelve: Wrapping Up
- ● Words from the Wise
- ● Review of Parking Lot
- ● Lessons Learned
- ● Completion of Action Plans and Evaluations
Once after the training we will provide you the course completion certificate.
Any one can attend this training
What does Mangates provide me on the day of the course?
What experience does Instructor has?
All our Instructors are Certified & Industry Experts and they have years of experience in the same filed.
Does this course includes exam?
This course does not include exams as this is non-certifications course. once after the training we provide course completion certificate with each credit per hour (SEU,s or PDU’s)