CSAU - Certified Security Aware User

This high-impact security awareness training addresses these issues. It ensures that your users are aware that they are a target; it motivates and changes behavior by teaching them how to use technology securely and ensures your organization remains compliant. In addition, by teaching your users the indicators of compromise and how to report incidents, you go beyond just prevention and begin developing human sensors, creating a far more resilient organization.

Duration: 1.0 day

Enquire Now

Start learning today!

Click Hereto customize your Training

Objectives

  • Learn basics of Security and understand about Vulnerabilities and how defense technologies like Anti-Virus, Firewall work
  • Understand how all the Latest Attacks are carried out with DEMOS. This will help the attendees to be more aware on the current threats and Risk
  • Learn on how hackers manipulate and turn their mind and data against them for a successful attack
  • Learn on different social engineering attacks including Facebook based attacks with DEMOS and Best practices on how to be aware and secure from these attacks
  • Learn on importance of Strong Passwords and how wrong password usage opens up for data theft resulting in Identity theft and compromise with DEMOS
  • Learn the best practices for Password and how to create and remember Strong passwords without sticking the passwords on the Monitor or keyboard
  • Learn on attacks via EMAIL and Messaging applications with DEMOS. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine
  • Learn on how Hackers compromise devices thru WiFi with DEMOS and how to secure office and personal devices from Hackers
  • Learn the necessity of Security on Mobile devices and how hackers hack your mobile devices and a sample Android Malware with DEMOs
  • Learn the security best practices for the mobile devices.

Content

Module 1: Introduction: Anatomy of an Attack

  • What is Security, Vulnerabilities & O-Days
  • Attack life Cycle & How much a hacker makes by selling your passwords and data?
  • Different Attack Vectors, Threats Vs. Risks, Exploit Basics
  • Why Perimeter defenses are failing?
  • Why Anti-Virus is not enough?

Module 2: Latest Attack Trends: 100% Live Hacking Demo

  • Mobile Malwares
  • Web Attacks
  • Business Email Compromise (BEC)
  • Ransomware
  • Advanced Persistent Threat
  • Malvertising
  • Identity Theft

Module 3: Social Engineering Attacks : 100% Live Hacking Demo

  • Drive by Download Attack with Java
  • USB / File attachment Attacks
  • Phone Call & Sweet Talking
  • Facebook and social Media based attacks
  • Best Practices for Safer Social Media Usage for Adults and Kids

Module 4: Password Management & Privacy

  • What is strong Password ? Why password must be changed at least once in 90 days?
  • Why u should not use same password in more than 1 web application?
  • Best Practices for Password Management & Privacy

Module 5: Email & Messaging Security

  • Email Spoofing
  • Phishing
  • Disposable Emails
  • WhatsApp, Telegram and similar Messaging Systems security
  • Best Practices for Email Security
  • Best Practices for Messaging Software

Module 6: Wireless Attacks: 100% Live Hacking Demo

  • Why Public Wifi and Free hotspots are dangerous?
  • Sniffing and MiTM attacks on Wifi
  • How to secure office and house Wifi

Module 7: Mobile Security

  • Jail Breaking & Rooting : Why its disaster?
  • Do you need Antivirus on a Mobile device?
  • How hackers hack your phone and control it?
  • Security best practices for Mobile

Audience

This training is an INTERACTIVE story board with 100% LIVE HACKING Demo based workshop for All users who use Internet, computers, Mobile Phones, and Social Media. NO Technical Jargon - Suitable for ALL.

Prerequisites

No technical knowledge required.

Certification

product-certification

Course Benefits

product-benefits
  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges

Cyber Security Popular Courses

crtp

A Certified Red Team Professional is a cybersecurity expert trained and certified to simulate cyberattacks and security breaches on a company's systems, network
Enquire Now
fvgxeV
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy