logo

Cybersecurity Awareness for Users (CS8525)

This introductory cybersecurity course is intended for all personnel working and handling information in the company. This is a course that aims to raise awareness of types of user-level information security threats.

A preferential rate (-15%) applies to the regular cost for non-profit organizations, as well as the government sector. In addition, you can benefit from additional advantages through a corporate agreement when you need to train several people or teams in your company. Contact us for details.

Public class

Duration: 
2 hours

Private class

Virtual classroom
Minimum no. of participants: 6
2 hours
Price on request
English or Serbian
Training plan: 

Lesson 1: What is computer security?

  • The need to secure data
  • The threats
  • Vulnerabilities
  • The attacks
  • Exploits
  • Countermeasures

Lesson 2: Social engineering

  • Techniques in social engineering
  • Phishing
  • By call, by text message, by physical presence
  • Detection tools
  • Example of a phishing website
  • Example of phishing emails
  • How to detect phishing?
  • Demonstration: Detecting Phishing

Lesson 3: Web browsing safety

  • Difficulty erasing your data on the web
  • Targeted browsing advertisements
  • The security of cookies
  • Filtering of inappropriate content
  • Disclosure of data on social networks
  • The use of private browsing
  • Best practices and user behavior
  • Application of company policies
  • Demo: Start Private Browsing

Lesson 4: Password Security

  • Password policies in corporate environments
  • Password too weak
  • Password too strong
  • The use of a password to access several distinct services
  • Multi-factor authentication (MFA)
  • Examples of complex passwords
  • Demonstration: Is my password secure?
  • Demonstration: Changing a password

Lesson 5: Email Security

  • Access to your mailbox
  • Transmission of emails in clear text
  • Eavesdropping/network interception
  • Secure tunnels

 Lesson 6: Malicious software

  • The vulnerabilities of failing systems
  • User behavior
  • Types of malicious software
  • Example of ransomware
  • Example of fake security software

Lesson 7: The security of your operating system

  • Security with anti-virus
  • Software updates
  • Good practices
  • Demonstration: How do I update my system?

Lesson 8: Mobile and wireless network security

  • Mobility is everywhere
  • The growing popularity of mobile devices
  • Mobile device security issues
  • Wireless network security
  • Home, work and public networks
  • VPNs for secure remote access
  • Demonstration: Explore available wireless networks

Lesson 9: Identity Theft

  • Your information is everywhere
  • Where is it stored?
  • How secure is it?
  • Can your information be stolen?
Exclusives: 
  • Course material accessible in electronic format
  • Certificate of attendance (on request)
Prerequisites: 

Basic knowledge of computer use and internet browsing

Contact us for more information on pricing::

Eccentrix
Office: 1-888-718-9732
E-mail: info@eccentrix.ca

130, King Street West, Suite 1800
Toronto, Ontario M5X 1E3
www.eccentrix.ca