A A A

Security Awareness Training

What is Security Awareness Training ?

Security awareness training is the process of providing formal cybersecurity education to your workforce about a variety of information security threats and your company’s policies and procedures for addressing them. Topics covered in security awareness training often expand beyond the digital world and discuss physical security and how employees can keep themselves and loved ones secure. Such training can take a variety of forms but is most often presented in an online or computer-based format.

Rather than a one-time event, security awareness training is most useful when approached as a critical ongoing practice in the context of a bigger security awareness program. The training and the program are integral to building a culture of security in modern, digitally dependent organizations.

Our Training Program

The IT Security program is designed to equip individuals and professionals with the knowledge and skills needed to manage security threats and common exposures to ensure high security lifestyle for their lives and property whiles using mobile phones, tablets, laptops, desktops, Printers and Copiers etc. for business and pleasure.

HAVE YOU EVER ASKED YOURSELF THIS QUESTION?

  • Why is my mobile phone, tablet or laptop so slow?

  •  Can someone really listen to my mobile phone calls without my permission?

  •  Someone stole my Facebook password, how did they do it and how can I protect myself?

  • How do I know I am being hacked because I am not an IT person?

  • I download movies on my computer, but are they safe?

  • How do I know I am being followed from work?

  • Can someone really take a photo from my mobile phone without my password and permission?

  • Someone installed a cracked software on my server, computer, mobile phone and tablet, it is cheap but is it safe?

  • I use a mobile phone, tablet and laptop with a camera, how safe is it

  •  I use a “china” phone and tablet, it is cheap and works fine but are they safe?

LEARNING OUTCOMES

Participants enrolled in this course would be able to:

Interpret security threats and behaviors in their environments

Analyze the security problem and determine the appropriate mitigation measures.

Implement the appropriate IT-Security Protocols that can be used to protect life and property.

Develop appropriate IT-Security Protocols to protect yourself and those who keep you in business.

Understand the global impact of IT Security vulnerability on Governance and businesses (Electoral fraud, manufacturing and Financial Institution hacking)

Understand impact of IT Security vulnerability on homes and country.

Understand Social engineering and why its popular these days

Protecting your mobile phone & Tablets & Laptops
Protecting yourself & home | tips on personal security
 Where to find more information