top of page
person-using-macbook-pro-on-white-table-
nexaacademy.png

Cybersecurity Awareness Virtual Instructor-led Training

Potential Cybersecurity Threats & Best Practices

Organisations may have the best cyber security procedures in place to protect the IT infrastructure. However, the vulnerabilities can also come from the end users: the workforce.

With the uncertainty caused by the COVID-19 pandemic, the workforce have shifted to delivering their responsibilities and results from home. This introduces a whole new set of cybersecurity challenges to be handled.

This course aims to educate the workforce to be aware of cyberthreats and also steps that can be taken to prevent personal and organisational data security breaches.

Who Should Attend

1.png

IT Personnels & Employees

Chances are you are now working from home or have to collaborate virtually with colleagues or clients. Get to know about basic cyberthreats and best practices to avoid from being a victim. 

2.png

Business Owners

With the uncertainty caused by the COVID-19 pandemic, the workforce have shifted to delivering their responsibilities and results from home. This introduces a whole new set of cybersecurity challenges to be handled.

3.png

Public

This course aims to educate the workforce to be aware of cyberthreats and also steps that can be taken to prevent personal and organisational data security breaches.

Protect

Modules

4.jpg
Introduction 

Importance of awarenessin this digital age

5.jpg
Public Wi-fi, is it safe?

Intro to Public Wi-fi. What are the risks involved in connecting to the internet via Public Wifi. How to adopt healthy cybersecurity habits?

6.jpg
Email Phishing & Vishing

Introduction to Email Phishing & Vishing. How to avoid becoming a victim?

7.jpg
Malware vs Ransomware

What is the difference between the two and how to prevent this cyber threat?

8.jpg
Google Hacks - Have I been pwned? 

How to check if your email accounts are compromised? and what to do about it?

9.jpg
Shodan Search Engine:A double-edged sword. 

What is Shodan? How is it used to infiltrate your home wifi? 

Bonus Content: Virtual Working

Securing your
Connection:
Secure VPN

How to ensure your information is communicated securely? What Tools are available?

Choosing your video conferencecall
platform

Comparison on available platforms. Which features do you really need?

Securing your laptops and homeworkstation: Endpoint Protections

Is your pre-installed antivirus enough to protect your workstation? 

Ensuring Business
Continuity

What are the steps and standard involved in ensuring Business Continuity?

Securing Your Data – Cloud Storage

Cloud Storage solutions – are they safe? What are the Pros & Cons?

Register Now

Course Duration: 2 Hours

Fees: RM 300
Free During MCO

Thanks for registering, we will get in touch with you very soon.

bottom of page