As Clint Eastwood once said, “If you want a guarantee, buy a toaster.” The only secure system is one that’s unplugged, turned off, and in a locked room. Since it’s not practical to leave our systems turned off, we need to understand the risks to our systems and prepare ourselves to defend them. Preparation begins with understanding — and that’s where awareness comes in.
With all the news stories about hackers, botnets, and breaches involving personal information, it’s easy for the security message to sound over-used and tired. It’s easy for people to say, “It won’t happen here.” Yet, studies and surveys repeatedly show that: the human factor (what employees do or don’t do) is the biggest threat to information systems and assets.
Most organizations have invested in myriad of security technologies to protect their infrastructure and data, putting in place solutions such as Firewalls, IPS/IDS, Encryptions and many more. However, many of these same organizations have failed to address the human element. People, just like computers, store, process and transfer highly valuable information. Yet people remain highly insecure, since so little has been done to educate them. As a result, cyber attackers are actively targeting the human element. Until you address the human issue, technology alone cannot secure your organization. Humans are the weakest link in the IT Security Chain.
High-impact security awareness training addresses these issues. It ensures that your users are aware that they are a target; it motivates and changes behavior by teaching them how to use technology securely and ensures your organization remains compliant. In addition, by teaching your users the indicators of compromise and how to report incidents, you go beyond just prevention and begin developing human sensors, creating a far more resilient organization.
For all users who use internet, computers, mobile phones and social media.
No technical jargons – Suitable for all
This program will be conducted with interactive lectures, PowerPoint presentation, discussions and practical exercise.
– What is Security
– Vulnerabilities & O-Days
– Attack life Cycle
– Hack Value: how much hacker makes by selling your passwords and data?
– Threats Vs. Risks
– Why Perimeter defenses are failing?
– Why Anti-Virus is not enough?
– Mobile Phone Malwares
– Web Attacks
– Business Email Compromise (BEC)
– Advanced Persistent Threat
– Identity Theft
– Whatsapp Image Attack
A professional who believes that adaptability of security is directly equal to the affordability of security products, services and trainings. Started creating security products, services and trainings and certifications that are affordable as well as be part of the team in creation Nation Cyber Security Frameworks
ALL IN FROM ONLY
RM5,390/DAY SAVE RM391
Agility in Marketing
Agility in Business
Agility in HR
Adobe Photoshop CC Foundation
Adobe Illustrator CC-Advance
Adobe Illustrator CC/CS6 Intermediate
RM1,315/day SAVE RM395
Infographics Using Powerpoint
RM1,530/day SAVE RM460
Microsoft Excel Dashboard for Business Intelligence
RM1,530/day SAVE RM460
Excel Amazing Macros
RM1,910/day SAVE RM575
Adobe Premiere Pro CC – Foundation