Certified Security Awareness 1 & 2 (CSA 1 & 2) – e-learning Opslaan als favoriet Deel deze pagina Printen Duur 365 dagen Prijs € 400,- 8,9 Reviews 1000+ reviews Planning Planning ophalen... Lesvorm e-training Schrijf je direct in Meer informatie Brochure downloaden The mile2 vendor neutral Certified Security Awareness certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks. Employees will learn that the weakest link in any security program is a poorly trained department. This course teaches general security awareness as well as how to develop a strong security culture within your company’s community. The Social Engineering portion of the class is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods. Computer fraud, black-hat hacking,cyber-terrorists; these phrases describe an innovative generation of criminals that use over-the-wire technology to attack us, steal from us and terrorize us. However, the best tool in their arsenal is not new. It is only used by the most experienced, the most dangerous, boldest hackers. This e-learning is in English Doel Upon completion, the Certified Security Awareness 1+2 candidate will not only be able to competently take the CSA1 and CSA2 exam but will also understand basic cyber security knowledge to keep companiesIP and IT infrastructure safe. Doelgroep Anyone, end users, company employees and basic computer users Voorkennis General computer knowledge Persoonlijk advies? Rokus Janssen salesmanager T. 088 542 78 88 E. r.janssen@vijfhart.nl Onderwerpen Certified Security Awareness 1 Module 1 – Basic Security Awareness, What is it and why it’s needed? Module 2 -Social Engineering Module 3 – Data Classification and corporate use (Safe Guarding) Personal vs. Business Use Module 4 – End User Best Practices Certified Security Awareness 2 Chapter 1 – Creating a Cyber Security Culture Chapter 2 – Social Engineer Attacks: Executive Management and Assets Chapter 3 – Incident Preparedness and Management Planning Chapter 4 – Laws and Global Compliance Standards Bekijk meer onderwerpenBekijk minder onderwerpen Certified Security Awareness 1 Module 1 – Basic Security Awareness, What is it and why it’s needed? End User Risk Trends Who, What and How are people the target What are the losses associated to end user hacks? Module 2 -Social Engineering Phishing mail, via phone, social websites are common Spear Phishing Spear Phishing Example: Fake email sample Social media Personification Module 3 – Data Classification and corporate use (Safe Guarding) Corporate Sensitive, internal or public classification Objectives of securing data (IP, Compliance/legislature) Personal vs. Business Use Segregating personal use with business use Data management Business standard for deleting data Personal standard of data dumping (old phones/hard drives and usb) Did you know that I can unearth deleted docs from a USB drive from a standard Forensics app off of the internet? How to delete and get rid of your old data Module 4 – End User Best Practices Internet utilization Hot spots, public places & roaming risks Safe Web Site surfing Discerning safe secure sites (never go to a site link indirectly) Locks and HTTPS Computer Usage Using computer in non-admin mode Ransomware Password management Removable Devices Mobile, Smart Phones and Tablets (risks associated with mobile devices) Device always locked Deviceshould always be trackable Certified Security Awareness 2 Chapter 1 – Creating a Cyber Security Culture Overview Non-malware Attack Statistics 2017 (Carbon Black) Cyber Security Culture Requirements for Successful CSC Steps to Create CSC Key People for a Successful CSC and Their Roles How Various Departments are Related to the CSC Program Leadership Skills Techniques Used by Successful Leaders Yearly Training and Drills Chapter 2 – Social Engineer Attacks: Executive Management and Assets Overview Techniques used by Hackers Why Executives are Pinpointed as Targets Whaling Attacks Recent Successful Whaling Attacks Whaling Mitigation Intellectual Property IP Categories IP Legally Defined Categories Keeping IP Safe Keeping IP Safe -Recommendation Chapter 3 – Incident Preparedness and Management Planning Overview Incident Mitigation Cyber Insurance Cyber Insurance Gaps Incident Preparedness Steps Preparation Step Identification Step Crisis Management Post Crisis Management General Recommendation for Post Crisis Chapter 4 – Laws and Global Compliance Standards Overview Laws & Standards Laws & Standards 12 PCI DSS Requirements SOX Most Important Sections Data Classification Objectives of Data Classification Personal vs. Business Use Business Standard for Deleting Data Mobile Device Security Risks BYOD Challenges BYOD Policy Planning & Prijs * *Een cursus met start gegarandeerd. *Een cursus met valt onder de actie Summer Academy. Alle prijzen zijn excl. BTW. Meer informatie over incompany of maatwerk Cursus: Certified Security Awareness 1 & 2 (CSA 1 & 2) - e-learning Vul onderstaand formulier in en je ontvangt meer informatie over de incompany- en maatwerkmogelijkheden van deze cursus. [contact-form-7 404 "Niet gevonden"] Wil je meer informatie ontvangen, een vrijblijvende offerte ontvangen of een brochure van deze cursus downloaden? Vul onderstaande gegevens in en je ontvangt de brochure of informatie binnen één werkdag. Offerte aanvragen Brochure downloaden Informatie aanvragen Soort training Deze cursus op eigen locatieEen maatwerk oplossing Akkoord met opvolging en privacyvoorwaardenIk ga akkoord met de privacy voorwaarden Akkoord met opvolging en privacyvoorwaardenIk ga akkoord met de privacy voorwaarden Akkoord met opvolging en privacyvoorwaardenIk ga akkoord met de privacy voorwaarden Gerelateerde cursussen Certified Penetration Testing Engineer (CPTE) – e-learning Certified Professional Ethical Hacker (CPEH) – e-learning Certified Cybersecurity Systems Manager (C)CSSM) – e-learning Certified Vulnerability Assessor (CVA) – e-learning Certified Network Principles (CNP) – e-learning Certified Information Systems Security Officer (CISSO) – e-learning Certified Cloud Security Officer (CCSO) – e-learning Certified Powershell Hacker (CPSH) – e-learning Certified Security Principles (CSP) – e-learning Certified Network Forensics Examiner (CNFE) – e-learning Ervaringen ervaringen verzameld via Lucienne Groenendaal Secretarieel medewerkster "Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid." 9 Ariana Scheepers "De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer." 10 Eric Pos Procesbeheerder bij Gemeente Amersfoort "Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan." 9 Tags: Security Share: Share Share Share Share
Lucienne Groenendaal Secretarieel medewerkster "Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid." 9
Ariana Scheepers "De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer." 10
Eric Pos Procesbeheerder bij Gemeente Amersfoort "Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan." 9