Cyber Security

Home » Cyber Security

Data, device, and information security is becoming more and more important these days, not only for organizations but also for individuals who need to protect against any cyber-related attacks on their data.

The course, Cyber Security focuses on learning the skills and very simple (and also complex) tips that immediately help you in protecting your personal, sensitive, and private information, data, and devices from cyber-related attacks or other forms of attacks on your personal data or organization.

Understanding these skills and tips does not require great expertise skills except in complex situations where you can simply use the expertise of the professional, so you can start immediately with ideas learned in this course.

The course is applicable to people on all levels.

Course Modules / Structure

The Course is divided into 4 Modules:

  • Module 1: Introduction to CyberSecurity
  • Module 2: Personal and Organizational Data and Vulnerability
  • Module 3: The Cyber Security Framework
  • Module 4: Dealing with Cyber Attacks – Tips

CASE STUDY – Using a Fictional Person/Name like Dominic

– Dominic works at a start-up company where they are currently facing some cyber-related attacks on a daily basis

– Dominic also notices that his personal data in his company laptop may be endangered

– Dominic also realizes that the company is slow to respond to these attacks and he would like to take some personal steps/actions himself to help both his personal data and company information

– Dominic will also want to apply these cyber-attack-preventive skills on his own laptop

CASE STUDY ANALYSIS:

– In case above, what do you think Dominic should consider doing?

Goals

  • Definitions of Cyber Security
  • Importance and Applications of Cyber Security
  • Types of Cyber Attacks
  • Personal and Organizational Data and Vulnerability
  • Vulnerabilities, Malwares and Ransomware
  • The Cyber Security Framework – Identify, Protect, Detect, Respond, Recover
  • Tips Dealing with Cyber Attacks – Data and Devices, Wireless Network, Ransomware, Phishing, Spoofing etc.

Prerequisites

  • Making out time to put the course skills into practice
  1. Course Introduction
  2. What is data ?
  3. What is information ?
  4. State of data / information.
  5. Data is equivalent to asset.
  6. Are Information & Cyber Security Same ?
  7. CIA Triad (Objectives of Cyber Security)
  8. AAA of Security Introduction.
  9. Types Of Hackers
  10. Scenario To Understand Threat, Vulnerability, Exploit, Risk & Impact
  11. Cyber Security Threats
  12. Threat actors and it’s types
  13. Vulnerabilities
  14. Risk
  15. Exposure
  16. Types of controls
  17. Functionalities Of Security Controls
  18. Summarization of threat actor, threat, vulnerability, risk and impact
  • Introduction to Cybersecurity concepts and terminology.
  • Understanding the threat landscape and different types of cyber attacks.
  • Overview of common cybersecurity vulnerabilities and weaknesses.
  • Fundamentals of network security and securing network infrastructure.
  • Introduction to cryptography and its role in securing data.
  • Best practices for securing operating systems and software applications.
  • Basics of secure coding and software development practices.
  • Introduction to web security and common web-based attacks.
  • Overview of mobile security and securing mobile devices.
  • Understanding the importance of security policies and procedures.
  • Introduction to incident response and handling security incidents.
  • Overview of risk management and risk assessment in cybersecurity.
  • Fundamentals of access control and authentication mechanisms.
  • Basics of security auditing and compliance requirements.
  • Introduction to ethical hacking and penetration testing.
  • Overview of security governance and compliance frameworks.
  • Understanding the role of security awareness and training.
  • Introduction to emerging trends and technologies in cybersecurity.
  • Overview of cloud security and securing cloud-based systems.
  • Fundamentals of digital forensics and evidence collection.

About this Course

  • Duration 4 Weeks
  • Certificate on Completion
  • Level Beginner
  • Price UGX 450,000 400,000

Enroll Now