Course Outline
Introduction
- Overview of Cyber Security for Government
- Importance of Cyber Security in the Public Sector
- Review of Common Hacking Techniques
Social Engineering
- Impersonation and Fraudulent Activities
- Non-Technical Social Engineering Tactics
- Reverse Social Engineering Methods
- Shoulder Surfing Incidents
- Dumpster Diving for Sensitive Information
- Eavesdropping on Confidential Conversations
Phishing
- Identifying Phishing Emails in Government Settings
- Deceptive Phishing Techniques
- Spear Phishing Targeting Specific Individuals
- Whaling Phishing Aimed at High-Profile Targets
- Phone Phishing Scams
Internet Security for Government
- Maintaining Safety While Using the Internet in Official Capacities
- Utilizing Safe Network Connections for Government Use
- Secure Data Sharing Outside of Official Networks
- Data Leakage Prevention and Monitoring Systems for Government
- Wi-Fi Phishing Attacks and Their Prevention
- Using Public WiFi Networks Safely for Government Purposes
- Risks of Browsing Non-HTTPS Websites in a Government Context
- Potential Dangers of Installing Software from Untrusted Sources
- Threats Posed by Key Loggers
- Mobile Security Best Practices for Government Employees
- Cloud Computing Security Measures for Government Operations
Email Security in Government
- Recommendations for Enhancing Email Security in the Public Sector
- Misaddressing Emails to Incorrect Recipients
- Ignoring Unknown Recipients and Their Requests
- Malware Distribution via Email
Password Security for Government Personnel
- Risks of Revealing Passwords Over the Phone
- Dangers of Saving Passwords on Public Computers
- Potential Risks of Writing Down Passwords
- Choosing Weak Passwords and Their Consequences
- Importance of Locking Your Computer When Not in Use
- Risks Associated with One-Time Password Hacking
- Guidelines for Selecting Strong Passwords
Organization Policies for Government
- Compliance with General Data Protection Regulation (GDPR)
- Implementation of Acceptable Use Policy in Government Agencies
- Procedures for Clearing Disk Drives Before Disposal
- Locking Office Spaces to Prevent Unauthorized Access
- Monitoring Workstations for Security Purposes
- Guidelines for Bringing Personal Devices to Work
- Travel Security Protocols for Government Employees
- Mobile Security Awareness Training for Government Staff
Cyber Security for Remote Workers in Government
- Potential Cyber Security Risks Faced by Remote Workers in the Public Sector
- Implementing Secure Remote Working Practices
- Best Practices for Ensuring Cyber Security While Working Remotely
Cyber Security for Secure Coding in Government
- An Overview of Secure Coding Principles for Government Applications
- Best Practices for Implementing Secure Coding in Government Projects
IT Security Best Practices for Government
- The Importance of IT Security in Government Operations
- Cyber Security Best Practices in the IT Industry, Adapted for Government Use
Summary and Next Steps for Government Agencies
Requirements
Fundamental Computer Knowledge for Government
Testimonials (7)
More knowledge and give us a wake up call to put some attentions in terms of all our accounts security.
Karen May - Inspectra Ltd
Course - Cyber Security Awareness Training
Exercises on real life situations.
LUZ STELLA - Inspectra Ltd
Course - Cyber Security Awareness Training
Data Protection and cyber awareness sessions
Neha Parekh - Inspectra Ltd
Course - Cyber Security Awareness Training
Be aware of the importance of maintaining good information security and mitigating the risk of misuse and unauthorized access to it, both in the work and personal spheres.
Jamella - Inspectra Ltd
Course - Cyber Security Awareness Training
Exposure to the different methods to keep safe online.
Jacob - Inspectra Ltd
Course - Cyber Security Awareness Training
It's a topic we don't have much knowledge about, but it's good to know how to recognize certain types of scams, especially on fake websites or phising, in order to avoid falling for them
Julian - Inspectra Ltd
Course - Cyber Security Awareness Training
The content was very interesting and the trainer was constantly interacting and adapting to our queries. He managed to make all the various levels of understanding the different staff had to grasp and understand the content.