Course Outline

Introduction

  • Overview of Cyber Security for Government
  • Importance of Cyber Security in the Public Sector
  • Review of Common Hacking Techniques

Social Engineering

  • Impersonation and Fraudulent Activities
  • Non-Technical Social Engineering Tactics
  • Reverse Social Engineering Methods
  • Shoulder Surfing Incidents
  • Dumpster Diving for Sensitive Information
  • Eavesdropping on Confidential Conversations

Phishing

  • Identifying Phishing Emails in Government Settings
  • Deceptive Phishing Techniques
  • Spear Phishing Targeting Specific Individuals
  • Whaling Phishing Aimed at High-Profile Targets
  • Phone Phishing Scams

Internet Security for Government

  • Maintaining Safety While Using the Internet in Official Capacities
  • Utilizing Safe Network Connections for Government Use
  • Secure Data Sharing Outside of Official Networks
  • Data Leakage Prevention and Monitoring Systems for Government
  • Wi-Fi Phishing Attacks and Their Prevention
  • Using Public WiFi Networks Safely for Government Purposes
  • Risks of Browsing Non-HTTPS Websites in a Government Context
  • Potential Dangers of Installing Software from Untrusted Sources
  • Threats Posed by Key Loggers
  • Mobile Security Best Practices for Government Employees
  • Cloud Computing Security Measures for Government Operations

Email Security in Government

  • Recommendations for Enhancing Email Security in the Public Sector
  • Misaddressing Emails to Incorrect Recipients
  • Ignoring Unknown Recipients and Their Requests
  • Malware Distribution via Email

Password Security for Government Personnel

  • Risks of Revealing Passwords Over the Phone
  • Dangers of Saving Passwords on Public Computers
  • Potential Risks of Writing Down Passwords
  • Choosing Weak Passwords and Their Consequences
  • Importance of Locking Your Computer When Not in Use
  • Risks Associated with One-Time Password Hacking
  • Guidelines for Selecting Strong Passwords

Organization Policies for Government

  • Compliance with General Data Protection Regulation (GDPR)
  • Implementation of Acceptable Use Policy in Government Agencies
  • Procedures for Clearing Disk Drives Before Disposal
  • Locking Office Spaces to Prevent Unauthorized Access
  • Monitoring Workstations for Security Purposes
  • Guidelines for Bringing Personal Devices to Work
  • Travel Security Protocols for Government Employees
  • Mobile Security Awareness Training for Government Staff

Cyber Security for Remote Workers in Government

  • Potential Cyber Security Risks Faced by Remote Workers in the Public Sector
  • Implementing Secure Remote Working Practices
  • Best Practices for Ensuring Cyber Security While Working Remotely

Cyber Security for Secure Coding in Government

  • An Overview of Secure Coding Principles for Government Applications
  • Best Practices for Implementing Secure Coding in Government Projects

IT Security Best Practices for Government

  • The Importance of IT Security in Government Operations
  • Cyber Security Best Practices in the IT Industry, Adapted for Government Use

Summary and Next Steps for Government Agencies

Requirements

Fundamental Computer Knowledge for Government

 7 Hours

Number of participants


Price per participant

Testimonials (7)

Upcoming Courses

Related Categories