top of page
Background (2).png

Defending Your Digital Footprint: Debunking IT Security Myths

What You Will Learn 

This overview training aims to educate attendees on common misconceptions in the fields of IT, IT Security, and Cybersecurity. It teaches them how to protect themselves from common attacks through live demonstrations. The attendees will learn about how hackers can manipulate and exploit their information for successful attacks and the various types of social engineering attacks, including Facebook-based attacks, with live demonstrations. They will also learn about the best practices for identifying and avoiding spam and phishing emails, as well as secure use of email and messaging software.


Objectives

After completing this workshop, participants will be able to:

  • Understand the common myths in IT, IT Security and Cybersecurity

  • Understand the Basics of Security and Attack Lifecycle

  • Understand how hackers phish your data and use it against you

  • Perform Best Practices to be aware and secure from attacks


Prerequisites

This workshop is for beginners and users who use the Internet, Computer, Mobile Phones, and Social Media.


Topic

CYBER SECURITY MYTHBUSTERS

This training helps attendees understand the common myths in IT, IT Security and Cybersecurity and teaches them how to defend themselves from common attacks. Each Scenario will be demonstrated with a Live Demo.

  • Websites are fully secure once there is a HTTPS Green or Gold lock

  • Antivirus will protect us from Viruses

  • WiFi Hotspots are safe 

  • As long as I don’t download a file from Internet, I will not be infected 

  • iPhone is Secure 

  • Mobile Apps downloaded from Play Store are Secure 

  • My Business / Data is too small for a cyber attack

  • Bringing my own Device is safe 

  • IT Will take care of everything, we don’t have to worry 

  • ‘From’ address in an Email confirms that the email is sent by the email user

  • My Online business is safe using marketplaces

  • Online shopping and Online payment are very safe 

  • USB devices are the safest storage medium : MIMIC USB Devices 


SOCIAL ENGINEERING / HACKING HUMANS

Attendees will learn on how hackers manipulate and turn their mind and data against them for a successful attack. Attendees will also learn on different social engineering attacks including Facebook based attacks with LIVE DEMOS and Best practices on how to be aware and secure from these attacks. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine

  • Drive by Download Attack 

  • USB / File attachment Attacks

  • Phone Call & Sweet Talking  (Vishing, Spoofcall)

  • Phishing Attack

  • Smishing Attack

  • Email Spoofing Attack

  • Facebook and social Media based attacks 

  • WhatsApp, Telegram and similar Messaging Systems security

  • Best Practices for Email Security

  • Best Practices for Messaging Software

  • Best Practices for Safer Social Media Usage



Assessment

Related Courses

GRC-103FT Microsoft Power Platform End-To-End Discovery Workshop (Fastrack).png

CCTIA: Certified Cyber Threat Intelligence Analyst

RM6,000.00

ILT/VILT

This program is intended for cybersecurity analysts, network and security administrators, entry-level cybersecurity workers, and SOC analysts. This program offers participants a comprehensive understanding of security threats, assaults, vulnerabilities, attacker behaviour, and the cyber death chain. In addition, participants will gain knowledge of the MITRE ATT&CK Framework and how to identify attacker approaches, tactics, and processes to examine compromised indicators and respond to eliminate the attack or incident.

 

The course will cover the fundamentals of Threat Intelligence and how to combine it with various technologies such as SIEM, SOAR, EDR, and other SOC technologies to reduce the time required to detect and respond to attacks. In addition, participants will learn how to establish a Threat Intelligence Framework and platform for their company, as well as how to utilize community and commercial feeds to comprehend attacks and defend their firm against future attacks.

 

Training Duration: 5 Days

  • Certificate Of Completion Available
  • Group Private Class
  • VILT Class Available
  • SBL-Khas Claimable

 

Download Course Outline

GRC-103FT Microsoft Power Platform End-To-End Discovery Workshop (Fastrack).png

CPT: Certified Penetration Tester

RM4,400.00

ILT/VILT

Certified Penetration Tester is a training and certification program that teaches participants how to do vulnerability assessments and penetration testing for clients.

 

This  cybersecurity course covers the most recent attacks and entry points, how to conduct vulnerability assessments on networks and systems, ways to harden networks to secure corporate infrastructure, exploit techniques on network, web, WiFi, and mobile infrastructure, as well as how to prepare and submit vulnerability assessment and penetration test reports.

 

This course is designed for network administrators, network executives, and security professionals who wish to conduct vulnerability assessments and penetration testing for their clients. Introduction to vulnerability assessment and penetration testing, information intelligence techniques, scanning and vulnerability assessment, cracking and social engineering, exploitation and penetration testing, PowerShell exploitation, web penetration testing, wireless penetration testing, and advanced exploitation techniques are covered.

 

Training Duration: 5 Days

  • Certificate Of Completion Available
  • Group Private Class
  • VILT Class Available
  • SBL-Khas Claimable

 

Download Course Outline

GRC-103FT Microsoft Power Platform End-To-End Discovery Workshop (Fastrack).png

CRTP: Certified Red Team Professional

RM6,000.00

ILT/VILT

The Certified Red Team Professional (CRTP) training program is a deep-dive, hands-on training course focusing on adversary simulation operations in enterprise contexts. Participants will acquire the offensive technical expertise required to mimic real-world attacks, react to defensive mitigations and responses using a variety of offensive tactics and strategies, and comprehend how to detect modern offensive tradecraft.

 

The training will cover the MITRE ATT&CK Framework, strategies for identifying attacker techniques, tactics, and procedures, planning and executing red team operations, post-exploitation tasks, Active Directory attacks, and conducting a thorough red team operation penetration test. This course is designed for Red Teamers, Bug Bounty Hunters, Security Analysts, Penetration Testers, IT Security Professionals, and anybody else interested in learning about the offensive side of Cyber Security.

 

Training Duration: 5 Days

  • Certificate Of Completion Available
  • Group Private Class
  • VILT Class Available
  • SBL-Khas Claimable

 

Download Course Outline

GRC-103FT Microsoft Power Platform End-To-End Discovery Workshop (Fastrack).png

CSACxO: Certified Security Aware CxO

RM600.00

ILT/VILT

The Certified Security Aware CxO course is designed for board and senior management members of an organization to comprehend cyber security and adopt a proactive approach. The course covers the most recent cyber threats, including mobile hacking, ransomware, advanced persistent threats, and social engineering, in addition to real-world attack use cases.

 

Participants will learn why cyber security is a board-level issue, how to manage it and their responsibilities in pre-breach, breach and post-breach scenarios.  In addition, this cybersecurity training covers risk management, governance frameworks, cyber insurance, and regulatory body rules. The training is meant for C-level executives and board members about cyber security without overwhelming them with technical terminology.

 

Training Duration: 1 Day

  • Certificate Of Completion Available
  • Group Private Class
  • VILT Class Available
  • SBL-Khas Claimable

 

Download Course Outline