Cybersecurity Awareness Virtual Instructor-led Training
Potential Cybersecurity Threats & Best Practices
Organisations may have the best cyber security procedures in place to protect the IT infrastructure. However, the vulnerabilities can also come from the end users: the workforce.
With the uncertainty caused by the COVID-19 pandemic, the workforce have shifted to delivering their responsibilities and results from home. This introduces a whole new set of cybersecurity challenges to be handled.
This course aims to educate the workforce to be aware of cyberthreats and also steps that can be taken to prevent personal and organisational data security breaches.
Who Should Attend

IT Personnels & Employees
Chances are you are now working from home or have to collaborate virtually with colleagues or clients. Get to know about basic cyberthreats and best practices to avoid from being a victim.

Business Owners
With the uncertainty caused by the COVID-19 pandemic, the workforce have shifted to delivering their responsibilities and results from home. This introduces a whole new set of cybersecurity challenges to be handled.

Public
This course aims to educate the workforce to be aware of cyberthreats and also steps that can be taken to prevent personal and organisational data security breaches.
Modules

Introduction
Importance of awarenessin this digital age

Public Wi-fi, is it safe?
Intro to Public Wi-fi. What are the risks involved in connecting to the internet via Public Wifi. How to adopt healthy cybersecurity habits?

Email Phishing & Vishing
Introduction to Email Phishing & Vishing. How to avoid becoming a victim?

Malware vs Ransomware
What is the difference between the two and how to prevent this cyber threat?

Google Hacks - Have I been pwned?
How to check if your email accounts are compromised? and what to do about it?

Shodan Search Engine:A double-edged sword.
What is Shodan? How is it used to infiltrate your home wifi?
Bonus Content: Virtual Working
Securing your
Connection:
Secure VPN
How to ensure your information is communicated securely? What Tools are available?
Choosing your video conferencecall
platform
Comparison on available platforms. Which features do you really need?
Securing your laptops and homeworkstation: Endpoint Protections
Is your pre-installed antivirus enough to protect your workstation?
Ensuring Business
Continuity
What are the steps and standard involved in ensuring Business Continuity?
Securing Your Data – Cloud Storage
Cloud Storage solutions – are they safe? What are the Pros & Cons?
Register Now
Course Duration: 2 Hours
Fees: RM 300
Free During MCO