To See All The Bundles That We Have. Please Click https://www.AcademyWall.com

The Workshop Training Library includes all of our courses for workshop training. Scroll down to see all of the courses included, plus other bulk pricing options. All of these workshop resources can be easily customized: mix and match training topics between courses, add new content, and even re-brand as your own.  Here's what's included with each course:

INSTRUCTOR GUIDE

TRAINING MANUAL

POWER POINT SLIDES

FLIP CHART NOTES

ACTIVITIES AND EXERCISE FILES

QUIZZES AND TESTING

 

Module One: Getting Started

Every organization is responsible for maintaining records. The ability to create, organize, and maintain records and archives is essential to success. Correct records keeping will not only offer liability protection; it will also increase efficiency and productivity. To put it simply, maintaining records and archives will improve the bottom line.

Workshop Objectives

Research has consistently demonstrated that when clear goals are associated with learning, it occurs more easily and rapidly. With that in mind, let’s review our goals for today.

At the end of this workshop, participants should be able to:

Define records and archives

Analyze records in context

Classify records

Understand different systems

Maintain and convert records

Module One: Getting Started
  • Icebreaker
  • Housekeeping Items
  • The Parking Lot
  • Workshop Objectives
Module Two: Cyber security Fundamentals
  • What is Cyberspace?
  • What is Cyber security?
  • Why is Cyber security Important?
  • What is a Hacker?
  • Case Study
  • Module Two: Review Questions
Module Three: Types of Malware
  • Worms
  • Viruses
  • Spyware
  • Trojans
  • Case Study
  • Module Three: Review Questions
Module Four: Cyber Security Breaches
  • Phishing
  • Identity Theft
  • Harassment
  • Cyberstalking
  • Case Study
  • Module Four: Review Questions
Module Five: Types of Cyber Attacks
  • Password Attacks
  • Denial of Service Attacks
  • Passive Attack
  • Penetration Testing
  • Case Study
  • Module Five: Review Questions
Module Six: Prevention Tips
  • Craft a Strong Password
  • Two-Step Verification
  • Download Attachments with Care
  • Question Legitimacy of Websites
  • Case Study
  • Module Six: Review Questions
Module Seven: Mobile Protection
  • No Credit Card Numbers
  • Place Lock on Phone
  • Don’t Save Passwords
  • No Personalized Contacts Listed
  • Case Study
  • Module Seven: Review Questions
Module Eight: Social Network Security
  • Don’t Reveal Location
  • Keep Birthdate Hidden
  • Have Private Profile
  • Don’t Link Accounts
  • Case Study
  • Module Eight: Review Questions
Module Nine: Prevention Software
  • Firewalls
  • Virtual Private Networks
  • Anti-Virus & Anti-Spyware
  • Routine Updates
  • Case Study
  • Module Nine: Review Questions
Module Ten: Critical Cyber Threats
  • Critical Cyber Threats
  • Cyber terrorism
  • Cyberwarfare
  •  
  • Cyberespionage
  • Case Study
  • Module Ten: Review Questions
Module Eleven: Defense Against Hackers
  • Cryptography
  • Digital Forensics
  • Intrusion Detection
  • Legal Recourse
  • Case Study
  • Module Eleven: Review Questions
Module Twelve: Wrapping Up
  • Words from the Wise
  • Review of Parking Lot
  • Lessons Learned
  • Completion of Action Plans and Evaluations