The Rules of Engagement have Changed. Resecure Everything.™

Securityone® Course Outline

Stacks Image 670

Cybersecurity: Main Concepts


  • What are Cyber threats?
  • Biggest hacks
  • Equifax
  • Wannacry
  • Specter
  • Macro and Micro impact
  • Global scenario
  • Business impact
  • Government impact
  • Individual privacy impact
  • What is hacking?
  • How safe is your data?
  • Passwords
  • Credit card/ debit card details
  • Online wallets
  • Bank account details
  • Smart Phone
  • Apps
  • Browsing
  • Smart pay options
  • Biometrics
  • Location
  • Video and Audio
  • Online browsing
  • Email
  • Password managers introduction
  • VPN introduction
  • Virus scanners introduction
  • Firewall introduction
  • Privacy rights
  • Types of cyber threats (optional)
  • What is Malware?
  • What is Ransomware?
  • What is Spam?
  • What are Data Leaks?
  • What are DoS attacks?

Web Browsing Security


  • Introduction to safe browsing
  • Keep software up-to-date
  • Scan all downloads
  • Trust sites with Avast Online Security Pugin
  • What are cookie and browser history?
  • How private are private tabs?
  • VPN Introduction and benefits


Encryption


  • What is encryption?
  • What is an Encryption Key?
  • Need for secure communication
  • Can it be hacked?
  • Digital Signatures and Private Keys
  • Login authentication
  • Communication encryption
  • File encryption

Windows 10 Security

  • Software updates
  • Application updates
  • 2FA
  • 3FA
  • Windows Firewall
  • Virus Scanner and frequency of checks
  • Biometrics security
  • File security
  • Backups
  • VPN setup
  • Application download preferences
  • Login and Admin preferences

Mac OS Security


  • Software updates
  • Application updates
  • 2FA
  • 3FA
  • Firewall
  • Virus Scanner and frequency of checks
  • Biometrics security
  • File security preferences
  • Backups
  • VPN setup
  • Bootcamp
  • Application download preferences
  • Login and Admin preferences

Securing Social Media


  • Facebook
  • Privacy Policy Overview
  • Privacy Rights
  • Privacy preferences and settings
  • Sharing privacy preferences
  • Blocking and reporting accounts
  • Spam messages
  • Fake news
  • Password practices
  • Message spams
  • Securing messenger app
  • Instagram
  • Privacy Policy Overview
  • Privacy Rights
  • Privacy preferences and settings
  • Sharing privacy preferences
  • Blocking and reporting accounts
  • Spam messages
  • Password practices
  • Twitter
  • Privacy Policy Overview
  • Privacy Rights
  • Privacy preferences and settings
  • Sharing privacy preferences
  • Blocking and reporting accounts
  • Spam messages
  • Password practices
  • Snapchat
  • Privacy Policy Overview
  • Privacy Rights
  • Privacy preferences and settings
  • Sharing privacy preferences
  • Blocking and reporting accounts
  • Spam messages
  • Password practices
  • Whatsapp
  • Privacy Policy Overview
  • Privacy Rights
  • Privacy preferences and settings
  • Notification and account preferences
  • Data sharing and storage preferences
  • Blocking and reporting accounts
  • Spam messages
  • Best Practices
  • Limit who has administrative access to your social media accounts
  • Set up 2-factor authentication
  • Configure your privacy settings to strengthen security and limit the amount of data shared.
  • Annually Review the network privacy settings
  • Avoid third-party applications that seem suspicious and modify your settings to limit the amount of information the applications can access.
  • Make sure you’re accessing your social media accounts on a current, updated web browser

Social Engineering


  • What is Social Engineering
  • Main sources of data for malicious actors
  • Social Media
  • Online activity through browsers
  • Spear Phishing
  • Password probability
  • How to stay safe?
  • Minimize amount of info shared online
  • Check sources and URL’s
  • Use 2FA and password managers

Application Security


  • Ensure encryption and overwriting
  • Inbuilt security features
  • Access control and scanning
  • Microsoft Office
  • Word
  • Security preferences
  • Storage preferences
  • Update preferences
  • Cloud storage
  • Excel
  • Security preferences
  • Storage preferences
  • Update preferences
  • Cloud storage
  • PowerPoint
  • Security preferences
  • Storage preferences
  • Update preferences
  • Cloud storage
  • MacOS office tools
  • Pages
  • Security preferences
  • Storage preferences
  • Update preferences
  • Cloud storage
  • Keynote
  • Security preferences
  • Storage preferences
  • Update preferences
  • Cloud storage
  • Numbers
  • Security preferences
  • Storage preferences
  • Update preferences
  • Cloud storage

Laptop Security


  • Network security
  • Harddrive scanning and security
  • Webcam and mic usage
  • Factory reset new devices
  • Setup 2FA
  • Backups
  • Cloud backups
  • Harddrive encryption

Smart Phone Security


  • Android
  • Update preferences
  • Application download preferences
  • Application management
  • Application data usage preferences
  • Application location preferences
  • Application mic and camera preferences
  • Application update preferences
  • Anti-Virus apps
  • 2FA
  • Biometrics preferences
  • Cloud backups
  • iOS
  • Update preferences
  • Application download preferences
  • Application management
  • Application data usage preferences
  • Application location preferences
  • Application mic and camera preferences
  • Application update preferences
  • Anti-Virus apps
  • 2FA
  • Biometrics preferences
  • Cloud backups
  • iTunes backups
  • Find my iPhone setup
  • Smart phone data access rights

Incident Response


  • How do you know when you have been hacked?
  • Account Access Failure
  • File Access Failure
  • Devices Access Failure
  • Ransomware
  • Application behaviors
  • OS behaviors
  • Browser behaviors
  • Reporting a cyber crime
  • Type of attack
  • Scale of attack
  • Assets at risk
  • Communication proof with hackers
  • Filing a case
  • Isolate and Backup

Safe Banking Online


  • Use 2FA
  • Use password managers
  • Smart phone app security
  • Pin security
  • Biometrics security
  • Chargebacks
  • Payee setup
  • Transaction reversal process
  • Credit/debit card online practices
  • OTP and PIN sharing practices
  • How to spot “Account Information Email and Call Phishing”

2-Factor Authentication


  • What is 2FA
  • How does it work?
  • 2FA for online transaction benefits
  • 2FA for smart phone security benefits
  • 2FA for laptop benefits
  • What is 3FA?

AntiVirus


  • What is an Antivirus?
  • When should I run a scan?
  • What does “unable to scan” mean?
  • Virus vault
  • Software updates
  • Security parameters updates
  • Anti – virus setup

Firewall


  • What is a firewall?
  • Firewall download preferences
  • Software updates
  • Security parameters updates
  • Firewall setup

Virtual Private Network


  • What is a VPN
  • Software updates
  • VPN for laptops
  • VPN for smart phones
  • VPN browser plugins
  • VPN setup

Best Practices for passwords


  • Password manager
  • Password manager setup for laptop
  • Password manager setup for smart phones
  • Password manager 2FA
  • Password manager updates
  • Password change frequency
  • Business passwords practices
  • Pin change frequency
  • Biometric authentication practices

Importance of updates


  • Why are updates needed?
  • Bugs and patches
  • Features and efficiency
  • Update practices for Android
  • Update practices for iOS
  • Update practices for Windows
  • Update practices for MacOS
  • Update practices for Linux

Network Security - WiFi and Bluetooth


  • Router Security
  • Change from manufacturer's default admin password to a unique, strong passphrase
  • Use a network monitoring app to scan for unwanted users
  • Restrict remote administrative management Log out after configuring
  • Keep firmware updated
  • Use separate Wi-Fi for guests or customers than you do for business
  • Physically secure Wi-Fi equipment
  • Use a virtual private network (VPN) when using public Wi-Fi
  • Do not connect to unknown, generic or suspicious Wi-Fi networks.
  • Use your mobile carrier's data plan to connect instead
  • Turn off Wi-Fi and Bluetooth when not in use on your devices
  • Secure your internet connection by using a firewall, encrypt information and hide your Wi- Fi network

Hardware Storage Security


  • Scan USBs and other external devices for viruses and malware
  • Disable auto-run, which allows USB drives to open automatically when they are inserted into a drive
  • Only pre-approved USB drives should be allowed in company devices.
  • Establish policies about the use of personal, unapproved devices being plugged into work devices
  • Keep personal and business USB drives separate
  • Don’t keep sensitive information on unencrypted USB drives.

Cybercrime protection


  • Cyber stalking protection
  • Cyber bulling protection
  • Hacking protection
  • Spam protection
  • Information Privacy protection

Information Credibility


  • Source credibility tools and resources
  • Source legitimacy protocols
  • Reporting or Flagging sources
  • Deep fake videos
  • Email legitimacy protocols
  • Software updates legitimacy

Data Privacy Rights


  • Data sharing rights
  • File sharing rights
  • Piracy and protection rights
  • Copyrights, Trademarks and Intellectual Property

Email Security


  • Require strong, unique passphrases on email accounts
  • Use 2FA
  • Do not use personal email accounts for company business
  • Do not to open suspicious links in email, tweets, posts, online ads, messages or attachments
  • Keep updated about your company’s spam filters and how to use them to prevent unwanted, harmful email



Share this page
Facebook
Twitter
LinkedIn
Email This Page
Print

Contact Us