A A A

Security Awareness Training

What is Security Awareness Training ?

Security awareness training is the process of providing formal cybersecurity education to your workforce about a variety of information security threats and your company’s policies and procedures for addressing them. Topics covered in security awareness training often expand beyond the digital world and discuss physical security and how employees can keep themselves and loved ones secure. Such training can take a variety of forms but is most often presented in an online or computer-based format.

Rather than a one-time event, security awareness training is most useful when approached as a critical ongoing practice in the context of a bigger security awareness program. The training and the program are integral to building a culture of security in modern, digitally dependent organizations.

Our Training Program

The IT Security program is designed to equip individuals and professionals with the knowledge and skills needed to manage security threats and common exposures to ensure high security lifestyle for their lives and property whiles using mobile phones, tablets, laptops, desktops, Printers and Copiers etc. for business and pleasure.

HAVE YOU EVER ASKED YOURSELF THIS QUESTION?

  • Why is my mobile phone, tablet or laptop so slow?

  •  Can someone really listen to my mobile phone calls without my permission?

  •  Someone stole my Facebook password, how did they do it and how can I protect myself?

  • How do I know I am being hacked because I am not an IT person?

  • I download movies on my computer, but are they safe?

  • How do I know I am being followed from work?

  • Can someone really take a photo from my mobile phone without my password and permission?

  • Someone installed a cracked software on my server, computer, mobile phone and tablet, it is cheap but is it safe?

  • I use a mobile phone, tablet and laptop with a camera, how safe is it

  •  I use a “china” phone and tablet, it is cheap and works fine but are they safe?

LEARNING OUTCOMES

Participants enrolled in this course would be able to:

Interpret security threats and behaviors in their environments

Analyze the security problem and determine the appropriate mitigation measures.

Implement the appropriate IT-Security Protocols that can be used to protect life and property.

Develop appropriate IT-Security Protocols to protect yourself and those who keep you in business.

Understand the global impact of IT Security vulnerability on Governance and businesses (Electoral fraud, manufacturing and Financial Institution hacking)

Understand impact of IT Security vulnerability on homes and country.

Understand Social engineering and why its popular these days

Protecting your mobile phone & Tablets & Laptops
Protecting yourself & home | tips on personal security
 Where to find more information

COURSE CONTENT

Introduction to information security

Practical tips – hard copy information

Practical tips – electronic information

Acting proportionately

Security breaches

Where to find more information

WHO SHOULD TAKE THE COURSE?

  • The course sessions are suitable for Business Chief Executive Officers, Managing Directors, CFOs, COOs
  • Financial Institution-Banks, Rural Banks, Savings and Loans, Microfinance, Non-Bank Financial Institutions, Educational institutions- Universities, Colleges, Polytechnic, Training Institutes, School Managers, University Managers, Private Schools Managers, Pre-school Managers and Operators.
  • Head of Departments and Line managers, Marketers and Salespersons, Finance department, Audit department, production/manufacturing department. Human Resource/Personnel department, Operations department, Personal Assistants, Administrators, Accounts Managers, 

  • Immigration, Police, Aviation, Flights Attendants, Cabin Crew, Hotel Managers and workers, Restaurants operators and Supply Chain Managers Night-Clubs and shops.
  • Electoral Commissioners, National Intelligence, Doctors, Nurses and other health workers
  • Media practitioners and journalists, Bodyguards and Chauffeur, Home and Office Security
  • member within those targeted sectors who requires vital information and guidance on effectively implementing information security measure, Data stewards and information managers. 

Need a service or help to discuss about a project?

We Are The Best IT Systems and Solutions Company providing IT Services over 5 years.