Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Data Security
- Ways to steal personal data
- Where do we provide our data?
- Data leaks
- What can a data leak lead to?
Online Payments
- Security of online payments
- Phishing sites mimicking online banking or immediate payment services (Blik, PayU, PayPal)
- Methods of "Blik" fraud
Safe Internet Usage
- Social media portals and privacy on them
- Email and phishing - fake invoices, attachments to shipments, etc.
- Installing software from untrusted sources, download agents
Best Practices
- What should a good password look like?
- Antivirus software and firewalls
- Backups
- Data encryption and encrypted communication in daily use
- System updates
- Remote work security
Requirements
- Basic computer and internet usage skills (browser, email, popular websites, online banking, etc.)
Audience
- All interested individuals
7 Hours
Testimonials (5)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
examples taken from real life, digressions, and exercises were useful, plus the possibility of asking questions at every stage
Karolina - Amer Sports Poland
Course - Governance, Risk Management & Compliance (GRC) Fundamentals
Machine Translated
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.