Cyber Safety: Empowering Employees in Digital Defence
Be Informed.
Be Protected.
Keep your organisation protected with essential cybersecurity awareness knowledge.
This cybersecurity awareness training is designed to equip employees with the knowledge and skills necessary to identify, respond to, and report cybersecurity threats, with a special focus on phishing attacks. Participants will learn through interactive activities, discussions, and real-world examples, fostering a culture of cybersecurity mindfulness in the workplace.
Learning Outcomes:
Organisation-specific Content
- Explanation and showcase of current cybersecurity initiatives by technical team
- Tailored to address specific cybersecurity risks and policies relevant to the organisation
- Meet internal audit requirements quickly & effectively
Interactive & Practical Learning
- Hands-on cybersecurity awareness activities
- Real-world scenarios to demonstrate risks
- Interactive discussion to contextualise and reinforce learning within teams
Facilitation
- Facilitator-led to ensure knowledge retention
- Emphasis of behavioural risks compromise organisational cybersecurity
- Learn up-to-date information from cybersecurity personnel
Comprehensive Course Materials
- Provision of cybersecurity quick reference guides for post-course reference
- Checklists for phishing email identification
- Tips for maintaining digital hygiene
Real-world Phishing Exercises
- Context-specific phishing demonstrations
- Post-training phishing exercise
Follow-Up Support
- Access to online tools and reading resources for continuous learning and reinforcement of cybersecurity best practices
Question text goes here
- Become familiar with different attack scenarios
Course Syllabus:
Chapter 01
Understanding Cyber Threats
Question text goes here
Core Business Operations and Cybersecurity:
- Identify Core Business Activities Tied to Cybersecurity
- Assessment of Organisation’s Cybersecurity Knowledge
- Overview of Cybersecurity Threats
- Real-life Case Studies
IT Asset Management:
- Identify and list essential business assets.
- Best practices for asset management.
- Regularly updating the company's asset list.
Industry-Specific Cybersecurity and Privacy Regulations:
- Define your industry concerning cybersecurity.
- Recognize and comply with industry-specific regulations.
- Understand and protect sensitive business information.
IT Assets, Business Operations, and Regulations Synthesis:
- Identify key software and hardware.
- Assess IT asset downtime impact.
- Understand Service Level Agreements (SLAs) and potential breach impacts.
Business Resilience Planning:
- Develop a Maintenance Plan.
- Recognize incidental security features.
- Understand regulatory impacts and potential cybersecurity failures.
Financial Aspects of Cybersecurity:
- Business Continuity Planning (BCP) basics and importance.
- Disaster Recovery Plan (DRP) importance and formulation.
- Evaluate cybersecurity costs, risks, and risk assessment.
Corporate Cyber Hygiene:
- Introduction to cyber hygiene.
- Best practices for enhancing cybersecurity.
- Address human risk factors and fostering a cyber-safe culture.
Open-source Intelligence (OSINT)
- Phishing Awareness with live demonstration
- Types of Online Information
- OSINT Tools Overview
- Hands-on Exercise with Shodan
Linux Fundamentals
- Role in Modern IT Systems
- Overview of Linux Distributions
- Hands-on: Basic Command Practice
Password Security
- Importance of Password Hygiene
- Brute Force Attacks: Introduction, Demonstration, and Defence
- Password Best Practices
- Creating & Managing Passwords
- Using Password Managers
- Secure Password Sharing
MITRE ATT&CK Framework
- Real-World Use Cases
- Practical Application
CIA Triad Framework
- Introduction
- Real-World Case Studies
- Application in Business Cybersecurity
Cyber Response Playbook
- The Need for a Playbook
- Responding to Business Email Compromise (BEC)
- Creation of BEC Standard Operating Procedures (SOPs)
- Cultivating Cyber Vigilance
Email Cybersecurity
- Procedures for Inspecting Suspicious Emails
- Importance of Email System Hygiene
- Introduction to Secure Email Gateway (SEG)
- Protocols for Incident Reporting
Simulated Cybersecurity Threat Scenario
- Defence Strategy Against Simulated Cyberattacks
- Identifying and Addressing Breaches
- Investigation and Reporting Protocols
Chapter 02
Cyber Threats & Defence Techniques
Question text goes here
- Become familiar with different attack scenarios
Chapter 03
Question text goes here
- Become familiar with different attack scenarios
Chapter 04
Question text goes here
- Become familiar with different attack scenarios
Chapter 05
Question text goes here
- Become familiar with different attack scenarios
Training Schedule:
Tailored To Client
Question text goes here
Training Methodology:
Interactive Training
- Demonstration of real cybersecurity scenarios
- Continuous engagement and hands-on training
- Real-time simulation of cyber risks
Threat & Adversary Alignment
- Based on real-world cyber threats
- Understanding of latest risk vectors
- Practical and effective defence solutions
Question text goes here
- Become familiar with different attack scenarios
FAQs:
What is the minimum pax for this programme?
- A minimum of 20 pax is required for this programme
Who is this programme for?
- This programme is for organisations that would like to enhance their cybersecurity protection amongst non-technical staff members. It is suitable for both managerial and non-managerial positions.
Can this programme be conducted online?
- Yes, we can deliver the programme online if preferred by you.
Any Funding Available?
- This cybersecurity awareness training is HRDF claimable for Malaysian companies.
Question text goes here
- Become familiar with different attack scenarios
Quick Info
Programme Fee
Custom Pricing
Duration
Tailored To Client
Schedule
Tailored To Client
Teacher-to-Student Ratio
1:30
Delivery Mode
Online or On-site
Register Now
Secure Your Future
Find out more about how we can help you secure your future in cybersecurity