COURSE CONTENT
CYBERSECURITY AWARENESS TRAINING
Duration: 2 Days
MODULE 1: Cybersecurity Fundamentals
- Content:
- Overview of cybersecurity concepts, focusing on current trends and challenges.
- Understanding Malaysia’s cybersecurity status and its global implications.
- The importance of cybersecurity in protecting data, systems, and organizations in the digital age.
- Challenges in cyberspace, including evolving threats and the need for proactive security measures.
- Objectives & Outcomes:
- Grasp fundamental cybersecurity concepts and their relevance in today’s context.
- Analyze the challenges posed by cybercrime and identify proactive strategies to safeguard sensitive information.
- Understand the implications of data breaches and the importance of protecting privacy.
MODULE 2: Social Media Security
- Content:
- Common cyberattacks targeting social media platforms such as phishing, scams, and malware.
- Risks associated with data theft and privacy invasion through social networks.
- Best practices for securing personal and organizational social media accounts.
- Objectives & Outcomes:
- Learn to recognize social media vulnerabilities, including scams and cyberbullying.
- Develop strategies to mitigate risks, secure accounts, and protect sensitive information.
- Enhance awareness of privacy and data security in the context of social platforms.
MODULE 3: Banking Scams
- Content:
- Examination of techniques hackers use to compromise banking systems, including phishing and account breaches.
- Recognizing counterfeit domains and identifying phishing emails.
- Best practices for safeguarding online banking credentials and transactions.
- Objectives & Outcomes:
- Understand the methods attackers use to exploit banking systems and prevent unauthorized access.
- Develop skills to identify legitimate emails and protect against phishing attempts.
- Enhance online banking security awareness to safeguard against fraud.
MODULE 4: WhatsApp Security
- Content:
- Exploration of cyber threats specific to WhatsApp, including phishing and data theft.
- Overview of WhatsApp’s security features, such as two-factor authentication and encryption.
- Identifying and mitigating scams designed to exploit users on WhatsApp.
- Objectives & Outcomes:
- Understand WhatsApp-related threats and scams.
- Configure WhatsApp’s built-in security features for enhanced protection.
- Identify and prevent potential risks while using the platform.
MODULE 5: Email Security and Scams
- Content:
- Insights into email-related threats, including phishing attacks and malware distribution.
- Techniques for configuring security settings in popular email applications (e.g., Gmail, Yahoo).
- Developing safe email usage habits to prevent scams and cyber threats.
- Objectives & Outcomes:
- Identify counterfeit emails and distinguish them from legitimate communications.
- Avoid falling victim to email-based scams and phishing attempts.
- Enhance email security by implementing best practices and advanced configurations.
MODULE 6: Hacking Wireless Networks
- Content:
- Basic concepts of wireless technology and its inherent vulnerabilities.
- Encryption protocols used in wireless communication and their effectiveness.
- Threats to wireless and Bluetooth networks, including hacking techniques.
- Countermeasures to secure wireless networks against potential breaches.
- Objectives & Outcomes:
- Understand the risks associated with wireless and Bluetooth networks.
- Learn how encryption protects data and recognize vulnerabilities.
- Apply countermeasures to mitigate risks and secure wireless communications.
MODULE 7: Malware Threats
- Content:
- Types of malware (e.g., viruses, worms, Trojans) and their impact on systems.
- Methods of malware propagation and infection.
- Techniques for analyzing malware and implementing countermeasures.
- Objectives & Outcomes:
- Identify and classify different types of malware.
- Understand how malware spreads and how to prevent infections.
- Employ strategies to analyze and remove malware effectively.
MODULE 8: System Hacking
- Content:
- Methods used by hackers to gain unauthorized access to systems.
- Password cracking, privilege escalation, and maintaining access within systems.
- Techniques for hiding and clearing logs to prevent detection.
- Objectives & Outcomes:
- Understand system hacking methodologies and the risks they pose.
- Learn to identify vulnerabilities and implement measures to prevent unauthorized access.
- Strengthen system defenses against hacking attempts.
MODULE 9: Social Engineering
- Content:
- Social engineering tactics, such as impersonation, phishing, and identity theft.
- Exploitation of trust and manipulation techniques used by attackers.
- Countermeasures to protect personal and organizational data.
- Objectives & Outcomes:
- Recognize social engineering techniques and their potential impact.
- Develop strategies to protect against these attacks.
- Enhance overall data privacy awareness and resilience.
MODULE 10: Denial of Service (DoS) Attacks
- Content:
- Understanding the principles of DoS and DDoS attacks and their organizational impact.
- Identifying botnets and attack patterns.
- Tools and countermeasures to prevent and mitigate DoS/DDoS attacks.
- Objectives & Outcomes:
- Understand the different types of DoS/DDoS attacks and how they function.
- Develop an effective response plan to mitigate the impact of such attacks.
- Enhance organizational preparedness against DoS/DDoS threats.