Cyber Security
	Every organization is responsible for ensuring cyber security.
			- Description
 - Reviews
 
			Module 1:
- Getting Started
 - Workshop Objectives
 
Module 2:
- Why Your Office Needs Administrative Procedures
 - What is Cyberspace?
 - What is Cyber Security?
 - Why is Cyber Security Important?
 - What is a Hacker?
 - Case Study
 
Module 3:
- Types of Malware
 - Worms
 - Viruses
 - Spyware
 - Trojans
 - Case Study
 
Module 4:
- Cyber Security Breaches
 - Phishing
 - Identify Theft
 - Harassments
 - Cyber Stalking
 - Case Study
 
Module 5:
- Types of Cyber Attacks
 - Password Attacks
 - Denial of Service Attacks
 - Passive Attack
 - Penetration Testing
 - Case Study
 
Module 6:
- Prevention Tips
 - Craft a Strong Password
 - Two-Step Verification
 - Download Attachments with Care
 - Question Legitimacy of Websites
 - Case Study
 
Module 7:
- Mobile Protection
 - No Credit Card Numbers
 - Place Lock on Phone
 - Don’t Save Passwords
 - No Personalized Contacts Listed
 - Case Study
 
Module 8:
- Social Network Security
 - Don’t Reveal Location
 - Keep Birthdate Hidden
 - Have Private Profile
 - Don’t Link Accounts
 - Case Study
 
Module 9:
- Prevention Software
 - Firewalls
 - Virtual Private Networks
 - Anti-Virus and Anti-Spyware
 - Routine Updates
 - Case Study
 
Module 10:
- Critical Cyber Threats
 - Critical Cyber Threats
 - Cyber Terrorism
 - Cyber Warfare
 - Cyber Espionage
 - Case Study
 
Module 11:
- Defense Against Hackers
 - Cryptography
 - Digital Forensics
 - Intrusion Detection
 - Legal Resource
 - Case Study
 
Module 12:
- Wrapping Up
 
						Please, login to leave a review