60% OFF Cyber Security Essentials

  • Module 1: Introduction to Cyber Security
  • Module 2: Emerging Threat Landscape & Types of Threats
  • Module 3: Social Engineering & Countermeasures
  • Module 4: Insider Threats & Countermeasures
  • Module 5: Malware Attacks
  • Module 6: Mobile Device Threats
  • Module 7: Data Leakage
  • Module 8: Internet of Things (IoT) Attacks
  • Module 9: Password Security & Best Practices
GHC350
GHC140.00
ADD TO CART
Category Cybersecurity
Price GHC140.00
Duration 4:00:35
Description

Cyberattacks have been rated the fifth top-rated risk in 2020 and have become the new norm across public and private sectors according to the World Economic Forum’s 2020 Global Risk Report. The usage of computer devices by employees has improved work efficiency but has however increased the risks of cyber-attacks through cases of interception of passwords, leakage of critical corporate data, opening malicious email attachments, installing cracked or compromised applications coupled with other forms of social engineering schemes, among others which affect the security of employees as well as organisations they work with. 

The course is designed to educate participants on their responsibilities to protect the confidentiality, availability, and integrity of their organization, personal information, and information assets used in their day-to-day activities. Information security is everyone's responsibility, not just the responsibility of the IT security department. The course is also ideal for those who want to start a career in cybersecurity.

What You Will Learn


✓ Existing and emerging cybersecurity threats targeting institutions and individuals;

✓ Existing and emerging cybersecurity threats targeting IT infrastructure/assets;

✓ Acquire skills to identify cybersecurity threats and incidents;

✓ Acquire requisite skills to reduce potential incidents of fraud from social engineering schemes;

✓ Be able to identify specific human factors that contribute to cybersecurity breaches and how they impact the security of institutions as well as individuals;

✓ Enhance compliance to cyber security standards and promote accountability in the use of informational assets pertaining to the institution’s IT infrastructure.

✓ Gain an understanding of how cybercriminals operate and how not to be a victim.


Requirements

There are no special requirements for this course. However, to partake in this course participants must have the following:

  • A good internet connection
  • Laptop / Desktop/Mobile Devices
  • Basic Knowledge in Computing

You Might Also Like

10% OFF

C)SP: Certified Sec…

Securi…

GHC1800.00
2000
0% OFF

C)PEH: Certified Pr…

To pro…

GHC2500
2500
10% OFF

C)DFE: Certified Di…

The Ce…

GHC2610.00
2900
10% OFF

Internet of Things …

Accord…

GHC13.50
15
9% OFF

C)NFE: Certified Ne…

The Ce…

GHC2275.00
2500