Duration
1 Days
6 CPD hours
This course is intended for
Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety.
Overview
After completing this course, students will be able to:
Identify and reduce human errors that put organizations at risk for a cyber-attacks.
Define Ransomware, Phishing, and Data Breaches to understand the differences.
Identify the motives of hackers.
Assess how data breaches occur.
Develop a plan on how to protect accounts and privacy.
Create a strong and secure password.
Work in a secure manner while using remote Wi-Fi access.
Safely use Virtual Private Networks (VPN).
Identify vulnerabilities in home networks to keep them secure.
Identity different social engineering techniques e.g. phishing, vishing.
Detect social engineering attempts and prevent potential breaches.
Prevent hackers from accessing a Mobile phone.
Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats.
INTRODUCTION TO CYBERSECURITY
Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks.
ACCOUNTS & CREDENTIALS SECURITY
One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords.
REMOTE SECURITY: WI-FI & VPN
Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments.
SOCIAL ENGINEERING
How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches.
MOBILE SECURITY
Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more.
Additional course details:
Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.
This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.
Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.
While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.
Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.