The Rules of Engagement have Changed. Resecure Everything.™
Rocheston
What We Do
Mission and Values
ANSI/ISO/IEC 17024
Management Team
Governing Board
Employment Opportunities
Become a Training Partner
Worldwide Offices
Rocheston Foundation
Contact Us
Certification
Training
Services
Exams
Accreditation
Why Accreditation
Nebula Metrics
Accreditation Standards
Accreditation Process
Benefits of Accreditation
How do I Become Accredited
Apply Here
Policies and Procedures
Case Studies and Testimonials
Awards
Distinguished Restaurant
Distinguished Engineer®
Distinguished Company
Distinguished Design
Distinguished CEO
Distinguished Lawyer
Distinguished Doctor
Distinguished Film Festival
Membership
What is Membership?
Benefits of Membership
Types of Membership
Join Now
Code of Ethics
Success Stories
Nebula.Reviews
Join the Program
Policies and Guidelines
How Do We Handle a Complaint
Frequently Asked Questions
File a Complaint
Books and Publications
Rocheston Rosê
Rocheston Research
Rocheston IoT Labs
Rocheston Cybernetwork®
Rocheston Cyberscanner®
Rocheston Cyber Range Sphere
Rocheston University
Rocheston Cyberclass®
Rocheston Cyberconnect
Rocheston Ramsys
Student Services
Rocheston.TV
o'Cafe.Coffee
Events
News and Events
Rocheston Blog
Rocheston Reinvent
Seminars and Conferences
Event Registration
Event Photos and Videos
Live Webinar
Training Calendar
Resources
Innovation Blog
Newsletter
Cybersecurity Challenge
Download Brochures
Student Testimonials
Roma Token
Rosecoin
Covid-19
Download Posters
RCCE Bespoke Certificates
Certification Badges
RCCE Merchandise Store
RCCE Hacker Badges
Vulnerability Maze
RCT Portal
ATP Portal
Accord Portal
Store
Securityone® Course Outline
Cybersecurity: Main Concepts
What are Cyber threats?
Biggest hacks
Equifax
Wannacry
Specter
Macro and Micro impact
Global scenario
Business impact
Government impact
Individual privacy impact
What is hacking?
How safe is your data?
Passwords
Credit card/ debit card details
Online wallets
Bank account details
Smart Phone
Apps
Browsing
Smart pay options
Biometrics
Location
Video and Audio
Online browsing
Email
Password managers introduction
VPN introduction
Virus scanners introduction
Firewall introduction
Privacy rights
Types of cyber threats (optional)
What is Malware?
What is Ransomware?
What is Spam?
What are Data Leaks?
What are DoS attacks?
Web Browsing Security
Introduction to safe browsing
Keep software up-to-date
Scan all downloads
Trust sites with Avast Online Security Pugin
What are cookie and browser history?
How private are private tabs?
VPN Introduction and benefits
Encryption
What is encryption?
What is an Encryption Key?
Need for secure communication
Can it be hacked?
Digital Signatures and Private Keys
Login authentication
Communication encryption
File encryption
Windows 10 Security
Software updates
Application updates
2FA
3FA
Windows Firewall
Virus Scanner and frequency of checks
Biometrics security
File security
Backups
VPN setup
Application download preferences
Login and Admin preferences
Mac OS Security
Software updates
Application updates
2FA
3FA
Firewall
Virus Scanner and frequency of checks
Biometrics security
File security preferences
Backups
VPN setup
Bootcamp
Application download preferences
Login and Admin preferences
Securing Social Media
Facebook
Privacy Policy Overview
Privacy Rights
Privacy preferences and settings
Sharing privacy preferences
Blocking and reporting accounts
Spam messages
Fake news
Password practices
Message spams
Securing messenger app
Instagram
Privacy Policy Overview
Privacy Rights
Privacy preferences and settings
Sharing privacy preferences
Blocking and reporting accounts
Spam messages
Password practices
Twitter
Privacy Policy Overview
Privacy Rights
Privacy preferences and settings
Sharing privacy preferences
Blocking and reporting accounts
Spam messages
Password practices
Snapchat
Privacy Policy Overview
Privacy Rights
Privacy preferences and settings
Sharing privacy preferences
Blocking and reporting accounts
Spam messages
Password practices
Whatsapp
Privacy Policy Overview
Privacy Rights
Privacy preferences and settings
Notification and account preferences
Data sharing and storage preferences
Blocking and reporting accounts
Spam messages
Best Practices
Limit who has administrative access to your social media accounts
Set up 2-factor authentication
Configure your privacy settings to strengthen security and limit the amount of data shared.
Annually Review the network privacy settings
Avoid third-party applications that seem suspicious and modify your settings to limit the amount of information the applications can access.
Make sure you’re accessing your social media accounts on a current, updated web browser
Social Engineering
What is Social Engineering
Main sources of data for malicious actors
Social Media
Online activity through browsers
Spear Phishing
Password probability
How to stay safe?
Minimize amount of info shared online
Check sources and URL’s
Use 2FA and password managers
Application Security
Ensure encryption and overwriting
Inbuilt security features
Access control and scanning
Microsoft Office
Word
Security preferences
Storage preferences
Update preferences
Cloud storage
Excel
Security preferences
Storage preferences
Update preferences
Cloud storage
PowerPoint
Security preferences
Storage preferences
Update preferences
Cloud storage
MacOS office tools
Pages
Security preferences
Storage preferences
Update preferences
Cloud storage
Keynote
Security preferences
Storage preferences
Update preferences
Cloud storage
Numbers
Security preferences
Storage preferences
Update preferences
Cloud storage
Laptop Security
Network security
Harddrive scanning and security
Webcam and mic usage
Factory reset new devices
Setup 2FA
Backups
Cloud backups
Harddrive encryption
Smart Phone Security
Android
Update preferences
Application download preferences
Application management
Application data usage preferences
Application location preferences
Application mic and camera preferences
Application update preferences
Anti-Virus apps
2FA
Biometrics preferences
Cloud backups
iOS
Update preferences
Application download preferences
Application management
Application data usage preferences
Application location preferences
Application mic and camera preferences
Application update preferences
Anti-Virus apps
2FA
Biometrics preferences
Cloud backups
iTunes backups
Find my iPhone setup
Smart phone data access rights
Incident Response
How do you know when you have been hacked?
Account Access Failure
File Access Failure
Devices Access Failure
Ransomware
Application behaviors
OS behaviors
Browser behaviors
Reporting a cyber crime
Type of attack
Scale of attack
Assets at risk
Communication proof with hackers
Filing a case
Isolate and Backup
Safe Banking Online
Use 2FA
Use password managers
Smart phone app security
Pin security
Biometrics security
Chargebacks
Payee setup
Transaction reversal process
Credit/debit card online practices
OTP and PIN sharing practices
How to spot “Account Information Email and Call Phishing”
2-Factor Authentication
What is 2FA
How does it work?
2FA for online transaction benefits
2FA for smart phone security benefits
2FA for laptop benefits
What is 3FA?
AntiVirus
What is an Antivirus?
When should I run a scan?
What does “unable to scan” mean?
Virus vault
Software updates
Security parameters updates
Anti – virus setup
Firewall
What is a firewall?
Firewall download preferences
Software updates
Security parameters updates
Firewall setup
Virtual Private Network
What is a VPN
Software updates
VPN for laptops
VPN for smart phones
VPN browser plugins
VPN setup
Best Practices for passwords
Password manager
Password manager setup for laptop
Password manager setup for smart phones
Password manager 2FA
Password manager updates
Password change frequency
Business passwords practices
Pin change frequency
Biometric authentication practices
Importance of updates
Why are updates needed?
Bugs and patches
Features and efficiency
Update practices for Android
Update practices for iOS
Update practices for Windows
Update practices for MacOS
Update practices for Linux
Network Security - WiFi and Bluetooth
Router Security
Change from manufacturer's default admin password to a unique, strong passphrase
Use a network monitoring app to scan for unwanted users
Restrict remote administrative management Log out after configuring
Keep firmware updated
Use separate Wi-Fi for guests or customers than you do for business
Physically secure Wi-Fi equipment
Use a virtual private network (VPN) when using public Wi-Fi
Do not connect to unknown, generic or suspicious Wi-Fi networks.
Use your mobile carrier's data plan to connect instead
Turn off Wi-Fi and Bluetooth when not in use on your devices
Secure your internet connection by using a firewall, encrypt information and hide your Wi- Fi network
Hardware Storage Security
Scan USBs and other external devices for viruses and malware
Disable auto-run, which allows USB drives to open automatically when they are inserted into a drive
Only pre-approved USB drives should be allowed in company devices.
Establish policies about the use of personal, unapproved devices being plugged into work devices
Keep personal and business USB drives separate
Don’t keep sensitive information on unencrypted USB drives.
Cybercrime protection
Cyber stalking protection
Cyber bulling protection
Hacking protection
Spam protection
Information Privacy protection
Information Credibility
Source credibility tools and resources
Source legitimacy protocols
Reporting or Flagging sources
Deep fake videos
Email legitimacy protocols
Software updates legitimacy
Data Privacy Rights
Data sharing rights
File sharing rights
Piracy and protection rights
Copyrights, Trademarks and Intellectual Property
Email Security
Require strong, unique passphrases on email accounts
Use 2FA
Do not use personal email accounts for company business
Do not to open suspicious links in email, tweets, posts, online ads, messages or attachments
Keep updated about your company’s spam filters and how to use them to prevent unwanted, harmful email
Share this page
Facebook
Twitter
LinkedIn
Email This Page
Print
Contact Us