Course Outline
Data Security
- Ways to Steal Personal Data
- Where Do We Provide Our Data?
- Data Leaks
- What Can a Data Leak Threaten?
Online Payments
- Security of Online Payments
- Phishing Sites Mimicking Online Banking or Immediate Payments (Blik, PayU, PayPal)
- Ways to Commit "Blik" Fraud
Internet Usage Security
- Social Media Portals and Privacy on Them
- Email and Phishing - Fake Invoices, Additional Charges for Shipments, etc.
- Installing Software from Untrusted Sources, Download Agents
Best Practices
- What Should a Good Password Look Like?
- Antivirus Software and Firewalls
- Backup Copies
- Data Encryption and Encrypted Communication in Daily Use
- System Updates
- Remote Work Security
Requirements
- ability to use a computer and the Internet (browser, email, popular websites, online banking, etc.)
Audience
- anyone interested in the topic
Testimonials (5)
examples taken from real life, digressions, exercises were useful plus the opportunity to ask questions at every stage
Karolina - Amer Sports Poland
Course - Governance, Risk Management & Compliance (GRC) Fundamentals
Machine Translated
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
I genuinely was benefit from the communication skills of the trainer.