Cyber Security Training  Syllabus

Module 1 : Basics of Information Security

  • Data Vs Information
  • Information Life cycle
  • What are Information Assets
  • Where does information reside
  • Importance of Information Assets
  • What is information security
  • CIA Triad
  • Information Classification
  • Why difficult to control information

Module 2 : Vulnerabilities and threats

  • What are the vulnerabilities
  • What is a threat
  • Examples of vulnerabilities and threats

Module 3 : Information Security Attacks

  • What is an information security attack?
  • Motives behind IS attacks
  • Types of attacks
  • Social Engineering
  • Identity theft
  • Phishing attack
  • Smishing attack
  • Pharming attack
  • Viruses and Worms
  • Ransomware
  • DoS and DDos attacks
  • Attacks on websites
  • Mobile threats

Module 4 : Information Security Controls

  • Types of controls
  • Detective Controls
  • Preventive controls
  • Corrective controls
  • Risk Management

Module 5 : Information Security incidents

  • What is an information security incident?
  • Incident types
  • Internal incidents
  • External incidents
  • Impact of an incident
  • Reporting security incidents

Module 6 : Information Security Best Practices

  • Password Security
  • Email security
  • Internet security
  • Information Security Policy
  • Responsibilities as a user
  • Conclusion

Our values as a cyber security training provider

Our Team

Contact Details