Cybersecurity Awareness Virtual Instructor-led Training

Potential Cybersecurity Threats & Best Practices

Organisations may have the best cyber security procedures in place to protect the IT infrastructure. However, the vulnerabilities can also come from the end users: the workforce.

With the uncertainty caused by the COVID-19 pandemic, the workforce have shifted to delivering their responsibilities and results from home. This introduces a whole new set of cybersecurity challenges to be handled.

This course aims to educate the workforce to be aware of cyberthreats and also steps that can be taken to prevent personal and organisational data security breaches.

Who Should Attend

IT Personnels & Employees

Chances are you are now working from home or have to collaborate virtually with colleagues or clients. Get to know about basic cyberthreats and best practices to avoid from being a victim. 

Business Owners

With the uncertainty caused by the COVID-19 pandemic, the workforce have shifted to delivering their responsibilities and results from home. This introduces a whole new set of cybersecurity challenges to be handled.

Public

This course aims to educate the workforce to be aware of cyberthreats and also steps that can be taken to prevent personal and organisational data security breaches.

 

Modules

Introduction 

Importance of awarenessin this digital age

Public Wi-fi, is it safe?

Intro to Public Wi-fi. What are the risks involved in connecting to the internet via Public Wifi. How to adopt healthy cybersecurity habits?

Email Phishing & Vishing

Introduction to Email Phishing & Vishing. How to avoid becoming a victim?

Malware vs Ransomware

What is the difference between the two and how to prevent this cyber threat?

Google Hacks - Have I been pwned? 

How to check if your email accounts are compromised? and what to do about it?

Shodan Search Engine:A double-edged sword. 

What is Shodan? How is it used to infiltrate your home wifi? 

Bonus Content: Virtual Working

Securing your
Connection:
Secure VPN

How to ensure your information is communicated securely? What Tools are available?

Choosing your video conferencecall
platform

Comparison on available platforms. Which features do you really need?

Securing your laptops and homeworkstation: Endpoint Protections

Is your pre-installed antivirus enough to protect your workstation? 

Ensuring Business
Continuity

What are the steps and standard involved in ensuring Business Continuity?

Securing Your Data – Cloud Storage

Cloud Storage solutions – are they safe? What are the Pros & Cons?

Register Now

Course Duration: 2 Hours

Fees: RM 300
Free During MCO

Email : sales@nexagate.com

Tel  : +603 2935 9363

WhatsApp: +60133911347

  • Facebook Black Round
  • Google+ Black Round

© Nexagate 2020 All Rights Reserved