Next Level Academy Cyber Security eBook Course

Save $44.05 USD
Only 0 left
Free worldwide shipping
Free returns
Carbon neutral
Secure payments


Module One: Getting Started

Every organization is responsible for maintaining records. The ability to create, organize, and maintain records and archives is essential to success. Correct records keeping will not only offer liability protection; it will also increase efficiency and productivity. To put it simply, maintaining records and archives will improve the bottom line.

Workshop Objectives

Research has consistently demonstrated that when clear goals are associated with learning, it occurs more easily and rapidly. With that in mind, let’s review our goals for today.

At the end of this workshop, participants should be able to:

Define records and archives

Analyze records in context

Classify records

Understand different systems

Maintain and convert records

Module One: Getting Started
  • Icebreaker
  • Housekeeping Items
  • The Parking Lot
  • Workshop Objectives
Module Two: Cyber security Fundamentals
  • What is Cyberspace?
  • What is Cyber security?
  • Why is Cyber security Important?
  • What is a Hacker?
  • Case Study
  • Module Two: Review Questions
Module Three: Types of Malware
  • Worms
  • Viruses
  • Spyware
  • Trojans
  • Case Study
  • Module Three: Review Questions
Module Four: Cyber Security Breaches
  • Phishing
  • Identity Theft
  • Harassment
  • Cyberstalking
  • Case Study
  • Module Four: Review Questions
Module Five: Types of Cyber Attacks
  • Password Attacks
  • Denial of Service Attacks
  • Passive Attack
  • Penetration Testing
  • Case Study
  • Module Five: Review Questions
Module Six: Prevention Tips
  • Craft a Strong Password
  • Two-Step Verification
  • Download Attachments with Care
  • Question Legitimacy of Websites
  • Case Study
  • Module Six: Review Questions
                                                              Module Seven: Mobile Protection
                                                              • No Credit Card Numbers
                                                              • Place Lock on Phone
                                                              • Don’t Save Passwords
                                                              • No Personalized Contacts Listed
                                                              • Case Study
                                                              • Module Seven: Review Questions
                                                              Module Eight: Social Network Security
                                                              • Don’t Reveal Location
                                                              • Keep Birthdate Hidden
                                                              • Have Private Profile
                                                              • Don’t Link Accounts
                                                              • Case Study
                                                              • Module Eight: Review Questions
                                                              Module Nine: Prevention Software
                                                              • Firewalls
                                                              • Virtual Private Networks
                                                              • Anti-Virus & Anti-Spyware
                                                              • Routine Updates
                                                              • Case Study
                                                              • Module Nine: Review Questions
                                                              Module Ten: Critical Cyber Threats
                                                              • Critical Cyber Threats
                                                              • Cyber terrorism
                                                              • Cyberwarfare
                                                              • Cyberespionage
                                                              • Case Study
                                                              • Module Ten: Review Questions
                                                              Module Eleven: Defense Against Hackers
                                                              • Cryptography
                                                              • Digital Forensics
                                                              • Intrusion Detection
                                                              • Legal Recourse
                                                              • Case Study
                                                              • Module Eleven: Review Questions
                                                              Module Twelve: Wrapping Up
                                                              • Words from the Wise
                                                              • Review of Parking Lot
                                                              • Lessons Learned
                                                              • Completion of Action Plans and Evaluations