To See All The Bundles That We Have. Please Click https://www.AcademyWall.com
The Workshop Training Library includes all of our courses for workshop training. Scroll down to see all of the courses included, plus other bulk pricing options. All of these workshop resources can be easily customized: mix and match training topics between courses, add new content, and even re-brand as your own. Here's what's included with each course:
INSTRUCTOR GUIDE
|
TRAINING MANUAL
|
POWER POINT SLIDES
|
FLIP CHART NOTES
|
ACTIVITIES AND EXERCISE FILES
|
QUIZZES AND TESTING
|
Module One: Getting Started
Every organization is responsible for maintaining records. The ability to create, organize, and maintain records and archives is essential to success. Correct records keeping will not only offer liability protection; it will also increase efficiency and productivity. To put it simply, maintaining records and archives will improve the bottom line.
Workshop Objectives
Research has consistently demonstrated that when clear goals are associated with learning, it occurs more easily and rapidly. With that in mind, let’s review our goals for today.
At the end of this workshop, participants should be able to:
Define records and archives
Analyze records in context
Classify records
Understand different systems
Maintain and convert records
Module One: Getting Started
- Icebreaker
- Housekeeping Items
- The Parking Lot
- Workshop Objectives
Module Two: Cyber security Fundamentals
- What is Cyberspace?
- What is Cyber security?
- Why is Cyber security Important?
- What is a Hacker?
- Case Study
- Module Two: Review Questions
Module Three: Types of Malware
- Worms
- Viruses
- Spyware
- Trojans
- Case Study
- Module Three: Review Questions
Module Four: Cyber Security Breaches
- Phishing
- Identity Theft
- Harassment
- Cyberstalking
- Case Study
- Module Four: Review Questions
Module Five: Types of Cyber Attacks
- Password Attacks
- Denial of Service Attacks
- Passive Attack
- Penetration Testing
- Case Study
- Module Five: Review Questions
Module Six: Prevention Tips
- Craft a Strong Password
- Two-Step Verification
- Download Attachments with Care
- Question Legitimacy of Websites
- Case Study
- Module Six: Review Questions
|
Module Seven: Mobile Protection
- No Credit Card Numbers
- Place Lock on Phone
- Don’t Save Passwords
- No Personalized Contacts Listed
- Case Study
- Module Seven: Review Questions
Module Eight: Social Network Security
- Don’t Reveal Location
- Keep Birthdate Hidden
- Have Private Profile
- Don’t Link Accounts
- Case Study
- Module Eight: Review Questions
Module Nine: Prevention Software
- Firewalls
- Virtual Private Networks
- Anti-Virus & Anti-Spyware
- Routine Updates
- Case Study
- Module Nine: Review Questions
Module Ten: Critical Cyber Threats
- Critical Cyber Threats
- Cyber terrorism
Cyberwarfare
-
- Cyberespionage
- Case Study
- Module Ten: Review Questions
Module Eleven: Defense Against Hackers
- Cryptography
- Digital Forensics
- Intrusion Detection
- Legal Recourse
- Case Study
- Module Eleven: Review Questions
Module Twelve: Wrapping Up
- Words from the Wise
- Review of Parking Lot
- Lessons Learned
- Completion of Action Plans and Evaluations
|