Course Outline

Introduction

  • Overview of Cyber Security for Government
  • Importance of Cyber Security in the Public Sector
  • Review of Common Hacking Techniques

Social Engineering

  • Impersonation and Fraudulent Activities
  • Non-Technical Social Engineering Tactics
  • Reverse Social Engineering Methods
  • Shoulder Surfing Incidents
  • Dumpster Diving for Sensitive Information
  • Eavesdropping on Confidential Conversations

Phishing

  • Identifying Phishing Emails in Government Settings
  • Deceptive Phishing Techniques
  • Spear Phishing Targeting Specific Individuals
  • Whaling Phishing Aimed at High-Profile Targets
  • Phone Phishing Scams

Internet Security for Government

  • Maintaining Safety While Using the Internet in Official Capacities
  • Utilizing Safe Network Connections for Government Use
  • Secure Data Sharing Outside of Official Networks
  • Data Leakage Prevention and Monitoring Systems for Government
  • Wi-Fi Phishing Attacks and Their Prevention
  • Using Public WiFi Networks Safely for Government Purposes
  • Risks of Browsing Non-HTTPS Websites in a Government Context
  • Potential Dangers of Installing Software from Untrusted Sources
  • Threats Posed by Key Loggers
  • Mobile Security Best Practices for Government Employees
  • Cloud Computing Security Measures for Government Operations

Email Security in Government

  • Recommendations for Enhancing Email Security in the Public Sector
  • Misaddressing Emails to Incorrect Recipients
  • Ignoring Unknown Recipients and Their Requests
  • Malware Distribution via Email

Password Security for Government Personnel

  • Risks of Revealing Passwords Over the Phone
  • Dangers of Saving Passwords on Public Computers
  • Potential Risks of Writing Down Passwords
  • Choosing Weak Passwords and Their Consequences
  • Importance of Locking Your Computer When Not in Use
  • Risks Associated with One-Time Password Hacking
  • Guidelines for Selecting Strong Passwords

Organization Policies for Government

  • Compliance with General Data Protection Regulation (GDPR)
  • Implementation of Acceptable Use Policy in Government Agencies
  • Procedures for Clearing Disk Drives Before Disposal
  • Locking Office Spaces to Prevent Unauthorized Access
  • Monitoring Workstations for Security Purposes
  • Guidelines for Bringing Personal Devices to Work
  • Travel Security Protocols for Government Employees
  • Mobile Security Awareness Training for Government Staff

Cyber Security for Remote Workers in Government

  • Potential Cyber Security Risks Faced by Remote Workers in the Public Sector
  • Implementing Secure Remote Working Practices
  • Best Practices for Ensuring Cyber Security While Working Remotely

Cyber Security for Secure Coding in Government

  • An Overview of Secure Coding Principles for Government Applications
  • Best Practices for Implementing Secure Coding in Government Projects

IT Security Best Practices for Government

  • The Importance of IT Security in Government Operations
  • Cyber Security Best Practices in the IT Industry, Adapted for Government Use

Summary and Next Steps for Government Agencies

Requirements

Fundamental Computer Knowledge for Government

The effective use of computers is essential in the public sector to enhance productivity and ensure efficient service delivery. Basic computer skills encompass understanding hardware components, operating systems, software applications, and network fundamentals. These foundational skills are crucial for government employees to navigate digital tools and systems seamlessly, supporting streamlined workflows, data management, and secure communication.

 7 Hours

Number of participants


Price per participant

Testimonials (7)

Upcoming Courses

Related Categories