
Defending Your Digital Footprint: Debunking IT Security Myths
What You Will Learn
This overview training aims to educate attendees on common misconceptions in the fields of IT, IT Security, and Cybersecurity. It teaches them how to protect themselves from common attacks through live demonstrations. The attendees will learn about how hackers can manipulate and exploit their information for successful attacks and the various types of social engineering attacks, including Facebook-based attacks, with live demonstrations. They will also learn about the best practices for identifying and avoiding spam and phishing emails, as well as secure use of email and messaging software.
Objectives
After completing this workshop, participants will be able to:
Understand the common myths in IT, IT Security and Cybersecurity
Understand the Basics of Security and Attack Lifecycle
Understand how hackers phish your data and use it against you
Perform Best Practices to be aware and secure from attacks
Prerequisites
This workshop is for beginners and users who use the Internet, Computer, Mobile Phones, and Social Media.
Topic
CYBER SECURITY MYTHBUSTERS
This training helps attendees understand the common myths in IT, IT Security and Cybersecurity and teaches them how to defend themselves from common attacks. Each Scenario will be demonstrated with a Live Demo.
Websites are fully secure once there is a HTTPS Green or Gold lock
Antivirus will protect us from Viruses
WiFi Hotspots are safe
As long as I don’t download a file from Internet, I will not be infected
iPhone is Secure
Mobile Apps downloaded from Play Store are Secure
My Business / Data is too small for a cyber attack
Bringing my own Device is safe
IT Will take care of everything, we don’t have to worry
‘From’ address in an Email confirms that the email is sent by the email user
My Online business is safe using marketplaces
Online shopping and Online payment are very safe
USB devices are the safest storage medium : MIMIC USB Devices
SOCIAL ENGINEERING / HACKING HUMANS
Attendees will learn on how hackers manipulate and turn their mind and data against them for a successful attack. Attendees will also learn on different social engineering attacks including Facebook based attacks with LIVE DEMOS and Best practices on how to be aware and secure from these attacks. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine
Drive by Download Attack
USB / File attachment Attacks
Phone Call & Sweet Talking (Vishing, Spoofcall)
Phishing Attack
Smishing Attack
Email Spoofing Attack
Facebook and social Media based attacks
WhatsApp, Telegram and similar Messaging Systems security
Best Practices for Email Security
Best Practices for Messaging Software
Best Practices for Safer Social Media Usage
Assessment
Related Courses
.jpg)
CCTIA: Certified Cyber Threat Intelligence Analyst
RM6,000.00
ILT/VILT
This program is intended for cybersecurity analysts, network and security administrators, entry-level cybersecurity workers, and SOC analysts. This program offers participants a comprehensive understanding of security threats, assaults, vulnerabilities, attacker behaviour, and the cyber death chain. In addition, participants will gain knowledge of the MITRE ATT&CK Framework and how to identify attacker approaches, tactics, and processes to examine compromised indicators and respond to eliminate the attack or incident.
The course will cover the fundamentals of Threat Intelligence and how to combine it with various technologies such as SIEM, SOAR, EDR, and other SOC technologies to reduce the time required to detect and respond to attacks. In addition, participants will learn how to establish a Threat Intelligence Framework and platform for their company, as well as how to utilize community and commercial feeds to comprehend attacks and defend their firm against future attacks.
Training Duration: 5 Days
- Certificate Of Completion Available
- Group Private Class
- VILT Class Available
- SBL-Khas Claimable
.jpg)
CPT: Certified Penetration Tester
RM4,400.00
ILT/VILT
Certified Penetration Tester is a training and certification program that teaches participants how to do vulnerability assessments and penetration testing for clients.
This cybersecurity course covers the most recent attacks and entry points, how to conduct vulnerability assessments on networks and systems, ways to harden networks to secure corporate infrastructure, exploit techniques on network, web, WiFi, and mobile infrastructure, as well as how to prepare and submit vulnerability assessment and penetration test reports.
This course is designed for network administrators, network executives, and security professionals who wish to conduct vulnerability assessments and penetration testing for their clients. Introduction to vulnerability assessment and penetration testing, information intelligence techniques, scanning and vulnerability assessment, cracking and social engineering, exploitation and penetration testing, PowerShell exploitation, web penetration testing, wireless penetration testing, and advanced exploitation techniques are covered.
Training Duration: 5 Days
- Certificate Of Completion Available
- Group Private Class
- VILT Class Available
- SBL-Khas Claimable
.jpg)
CRTP: Certified Red Team Professional
RM6,000.00
ILT/VILT
The Certified Red Team Professional (CRTP) training program is a deep-dive, hands-on training course focusing on adversary simulation operations in enterprise contexts. Participants will acquire the offensive technical expertise required to mimic real-world attacks, react to defensive mitigations and responses using a variety of offensive tactics and strategies, and comprehend how to detect modern offensive tradecraft.
The training will cover the MITRE ATT&CK Framework, strategies for identifying attacker techniques, tactics, and procedures, planning and executing red team operations, post-exploitation tasks, Active Directory attacks, and conducting a thorough red team operation penetration test. This course is designed for Red Teamers, Bug Bounty Hunters, Security Analysts, Penetration Testers, IT Security Professionals, and anybody else interested in learning about the offensive side of Cyber Security.
Training Duration: 5 Days
- Certificate Of Completion Available
- Group Private Class
- VILT Class Available
- SBL-Khas Claimable
.jpg)
CSACxO: Certified Security Aware CxO
RM600.00
ILT/VILT
The Certified Security Aware CxO course is designed for board and senior management members of an organization to comprehend cyber security and adopt a proactive approach. The course covers the most recent cyber threats, including mobile hacking, ransomware, advanced persistent threats, and social engineering, in addition to real-world attack use cases.
Participants will learn why cyber security is a board-level issue, how to manage it and their responsibilities in pre-breach, breach and post-breach scenarios. In addition, this cybersecurity training covers risk management, governance frameworks, cyber insurance, and regulatory body rules. The training is meant for C-level executives and board members about cyber security without overwhelming them with technical terminology.
Training Duration: 1 Day
- Certificate Of Completion Available
- Group Private Class
- VILT Class Available
- SBL-Khas Claimable
