Select Page

SEC303: Cybersecurity Simplified for Non-Technical Users

 

Course Duration: 2 Days

Cybersecurity is a major concern for everyone, but it doesn’t have to be complicated

Course Introduction

This training is designed to simplify cybersecurity for non-techies. It looks at cybersecurity from a user’s perspective.  It will teach you how to protect your data on any device from anything that could breach digital security and privacy when communicating on the Internet. It is about creating and maintaining basic digital hygiene. The focus is on the actions you could take today to greatly improve your cybersecurity and protect yourself, family and business.

At the end of the training, you will understand security principles, and how to use them to implement simple security hygiene that would result in huge benefits to your digital security.

For the ease of understanding, we have treated Cybersecurity from the user’s perspectives by answering the simple question. What can I do to be safe online and manage my privacy?  The answer to this question can be divided into four main areas of cybersecurity, and privacy. These are

  • Device security
  • User account security
  • Communication security
  • Privacy

The course will teach you several security principles, and how to implement them in real life. Finally, you will get written plan to follow. The subjects covered include how to strongly improve your security by easily implementing the following:

Training Content

Password Management

Each user must manage access to tens, if not hundreds of websites today. It can be confusing and hard to manage password due to the number of passwords that need to be managed. As a result, passwords are repeatedly used on multiple sites. In cybersecurity, this is the first problem that needs to be solved. In this section you will learn how to manage all your account in a central location and properly manage your account credentials in a secure way.

Two factor authentication (2FA)

Using password only is not the strongest form of authentication. Therefore, the user of two factor Authentication (2FA) is highly encouraged. Although, this will increase your security, it creates a new challenge of managing these 2FA codes. So, it is important to know how to manage and backup these 2FA system.

Disk encryption

Disk encryption is not for spies or criminals who have something to hide. Encryption is a legitimate cybersecurity controls which can help you increase security whether you have something to hide or not. It can also help in improving your privacy by protecting confidential information on your computer.

However, encryption is not widely used by users due to the perseived complexity. Your emails, payment information, and other types of information can be protected using different forms of encryption that are easy to use. This section will teach you the types of encryptions that are available to you as part of your security measures for cybersecurity and how to implement them correctly.

System security

Proper security measures should begin with the system. You will learn to secure your system by implementing good Operating Systems security. Setup endpoint security to detect and stop possible intrusion into your system.

Browser security

The browser has become the major tool we use daily. As such, the browser is on the firing line daily from phishing attack, malware, and hackers who tries to make use of misconfigurations or bugs in the browsers to gain access to the system. It is important to choose a secure browser, but also learn to maintain it regularly. Learn to use security extensions that greatly improve your security on the internet.

Mobile security

Mobile phones are used today for everything, from simple telephone calls, and chat to Internet banking. A compromised phone is a compromise of your life. Learning to secure your phone and maintaining security all the time is a highly recommended kills to have.

Backup security

With the proliferation of phishing and ransomware attack, many people are starting to learn about the importance of good backup system. However, it is still very difficult for non-technical people to implement a backup system that could resist a ransomware attack. The goal of this section is to teach you how to implement a good backup system that could mitigate a ransomware attack.

Lock up social media

Social media is a major source of risk to cybersecurity, and online safety. Posting of too many personal information increase your exposing to cybercrime. The chance that a successful phishing attack would work on you partly depends how much information Cyber criminals can learn about you. Many of the information They need can be found on your social media posts and profiles. It is very important to learn how to secure your social media profile and stay safe online.

Email security

Email is still a major way of communicating. However, many of the old problems of email, such as spam, and phishing are still there. Although, there are lots of technologies to deal with these problems, they are not often implemented. As a result, most people are still using email unsecurely.  This section will teach you the types of security available to you to secure your email communications, and how to implement them.

Virtual Private Network (VPN) on all devices

Using a VPN will add a layer of protection to your Internet traffic, and could stop bad actors from seeing your private information. Learn to setup, and use VPN daily because it is designed to provide two things. Privacy of your communication, and confidentiality.

  • This solution provides users the ability to access a private network even though they are not physically connected to it.
  • Allow remote employees access corporate resources without compromising security and prevent information leakage.
  • Improve your online privacy on the Internet to hide web traffic from networks that are not trusted. Hide your Internet Protocol (IP) address and encrypts the data that you send over the Internet while you are connected to a VPN.
  • Provide security when you access public Wi-Fi networks at airports, cafes or hotels. Hackers often use public network to attack users of those networks.

Wi-Fi security

Wi-Fi is everywhere. Hackers are also out there to attack you on a Wi-Fi. There are many ways you can secure your Wi-Fi connection at home and when under way. This section will teach you the types of attacks that Wi-Fi networks are vulnerable to, and how to protect against them.

Network segmentation

No matter how small a network is everyone, and every device on the network are exposed to each other. If you let other people access your Wi-Fi network once, they will always have access anytime they are in the area unless you change the Wi-Fi password. Once they have access, they can also access other devices on your network even when you are not at home. This is one reason you would want to divide your network into several partitions or security zones so you can place devices in separate security zones depending on the security requirement.

Internet Safety for all

In this section you will learn how to prevent websites from tracking your every move, and how to protect everyone in your household, or your business.

  • Implement strong privacy on your browsers.
  • Setup strong traffic filtering system for the entire family and control it on your routers.
  • In this section you will learn how to use free tools to setup DNS filtering on your home or small business network to protect your privacy and reduce phishing attack and other malicious activities online.
  • Learn how to set up DNS redirection to stop all malicious site request.

IoT security

If you have security cameras, baby monitoring, smart TV’s and other smart devices then you have IoT devices. These devices are not only connected to the Internet but are constantly exposing your privacy to the internet daily. Many of these devices are not secured because there is no security inbuilt and those with security inbuilt are not properly configured. Learn about simple steps to take to secure your IoT devices and be one step ahead of the attackers.

There are different types of security measures you could implement to prevent any uninvited guests from finding you and your family. This section will give you simple steps to secure your smart gizmos or gadgets from being hacked into. It will also show you how to setup strong security measures to protect you, and your family.

Who Should Attend?

If you are a non-technical user who wants to protect yourself from hackers, this training is for you! You don’t need any prior knowledge or experience with cybersecurity to take this course. It’s designed specifically for non-technical users who want an easy way to learn the basics of cybersecurity as quickly as possible.

How To Attend

This is a 2-day training. To attend, please contact use at: