330,000.00

Category: Tag:

Description

Date

1st Batch: 10th – 12th Feb, 2025

2nd Batch: 22nd – 24th May, 2025

3rd Batch: 11th – 13th Aug, 2025

4th Batch: 30th Oct – 1st Nov, 2025

Event Details

Upon completion, learners will have examined the most important concepts and teachings at the heart of successful security management.

CONTENT:

  • What is Cyber Security?
  • Importance of Security
  • Physical Security
  • Physical Threats
  • User tracking
  • Spamming
  • Cross Site Scripting
  • Online Auction Fraud
  • Cyber Squatting
  • Logic Bombs
  • Web Jacking
  • Internet Time Thefts
  • Data Diddling
  • Email Spoofing
  • Prevention Environment
  • Corporate Governance Structure
  • Tone at the Top
  • Policies and Procedures
  • Perception of Detection
  • Surveillance
  • Anonymous Tips

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

Leave a Reply

Your email address will not be published. Required fields are marked *