{"id":3363,"date":"2024-12-12T17:33:52","date_gmt":"2024-12-12T12:03:52","guid":{"rendered":"https:\/\/symbizsolutions.com\/academy\/?page_id=3363"},"modified":"2024-12-12T17:43:46","modified_gmt":"2024-12-12T12:13:46","slug":"cyber-security-awareness-course","status":"publish","type":"page","link":"https:\/\/symbizsolutions.com\/academy\/cyber-security-awareness-course\/","title":{"rendered":"Cyber Security Awareness Course"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3363\" class=\"elementor elementor-3363\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b0fd150 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3b0fd150\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34a2e2fd\" data-id=\"34a2e2fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2bd208b elementor-widget elementor-widget-heading\" data-id=\"2bd208b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CYBER SECURITY AWARENESS COURSE<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-467ef7b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"467ef7b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-42afa2d4\" data-id=\"42afa2d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28dd6404 elementor-widget elementor-widget-heading\" data-id=\"28dd6404\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b5ed8e elementor-widget elementor-widget-text-editor\" data-id=\"8b5ed8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Symbiz Academy offers training in CyberSecurity Awareness.The course outline covers essential cybersecurity concepts, including personal and organizational data protection, online and offline identity management, and methods to secure online transactions. It addresses cyber threats like phishing, malware, spoofing, and social engineering while emphasizing practical skills such as mobile device security, authentication protocols, and incident reporting. Participants will gain insights into cybercrime, ethical hacking, and digital forensics, equipping them with the knowledge to identify, prevent, and respond to various cyber threats effectively.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-672dfa4b elementor-widget elementor-widget-heading\" data-id=\"672dfa4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Duration: 16 hours<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5298abf8 elementor-widget elementor-widget-heading\" data-id=\"5298abf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mode: Classroom or Online Session<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59a2133 elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"59a2133\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-9391\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-9391\" aria-expanded=\"false\">Outline<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-9392\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9392\" aria-expanded=\"false\">Who can Join<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-9393\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9393\" aria-expanded=\"false\">Course Outcome<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-9394\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9394\" aria-expanded=\"false\">Instructor<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-9391\" aria-expanded=\"false\">Outline<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-9391\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-9391\" tabindex=\"0\" hidden=\"false\"><h4>Personal &amp; Organization Data<\/h4><ul><li>Explain the characteristics and value of personal<\/li><li>Define personal<\/li><li>Online and Offline Identity<\/li><li>Going Incognito<\/li><li>Securing online bank transactions<\/li><li>Personal data as target<\/li><\/ul><h5>Attackers and Cybersecurity Professionals<\/h5><ul><li>What is cybersecurity<\/li><li>What is Cybercrime \/ Forensics<\/li><li>How hackers works<\/li><li>Skills of Ethical hackers<\/li><li>Characteristics, goal, objectives &amp; motives of cyber attackers and the legal and ethical issues for cybersecurity professionals.<\/li><\/ul><h5>How to Avoid Getting Scammed Online<\/h5><ul><li>What are scams?<\/li><li>What is online fraud?<\/li><li>Types of Online Scams<\/li><li>What to Keep in Mind to Avoid Getting Scammed<\/li><li>How to Spot Online Fraud\/Scam<\/li><li>How to Prevent Getting Scammed<\/li><li>What is Spoofing?<\/li><li>Internal social engineering<\/li><li>Internal online fraud protection<\/li><li>Phishing protection<\/li><li>Malicious antivirus identification<\/li><li>Malware protection<\/li><li>Malicious software scenario policies<\/li><li>Verification standards for information seekers<\/li><\/ul><h5>Securing Mobile Devices<\/h5><ul><li>Vulnerabilities in smartphone devices<\/li><li>Cyber Threats to mobile devices<\/li><li>Best practices for securing mobile devices<\/li><li>Software security<\/li><li>Effective Mobile Device Management<\/li><li>What to do if mobile device is stolen or lost<\/li><\/ul><p>\u00a0<\/p><h5>Social Engineering Techniques<\/h5><ul><li>Methodology of information gathering<\/li><li>Internet search Engines<\/li><li>Social media<\/li><li>Tools \/ Applications<\/li><\/ul><h5>Cybersecurity Basics<\/h5><ul><li>Anti-Virus Software<\/li><li>Application<\/li><li>Authentication<\/li><li>Authorization<\/li><li>Backdoor<\/li><li>Backup<\/li><li>Bandwidth<\/li><li>Blacklisting Software<\/li><li>Brute Force Attack<\/li><li>Clear Desk\/Screen Policy<\/li><li>Cloud Security<\/li><li>Cookie<\/li><li>Cyberbullying<\/li><li>Cybersecurity<\/li><li>Cyber Threats<\/li><li>Data breaches<\/li><li>Data Privacy<\/li><li>Denial of Service Attack<\/li><li>Dictionary Attack<\/li><li>Digital Certificate<\/li><li>Domain Hijacking<\/li><li>Domain Name System (DNS)<\/li><li>Dumpster Diving<\/li><li>Electronic Infections<\/li><li>Encryption<\/li><li>End User License Agreement<\/li><li>File-Sharing Programs<\/li><li>Fake News<\/li><li>Firewall<\/li><li>Flooding<\/li><li>Grooming<\/li><li>Hacker<\/li><li>Hacking &#8211; Ethical<\/li><li>HTTPS<\/li><li>Hybrid Attack<\/li><li>Instant Messaging (IM)<\/li><li>Identity Theft<\/li><li>IP (Internet Protocol) Address<\/li><li>Incident response<\/li><li>Internet Service Provider (ISP)<\/li><li>Keystroke Logger<\/li><li>Malware<\/li><li>Man-In-the-Middle Attack<\/li><li>Monitoring Software<\/li><li>Network<\/li><li>Operating System (OS)<\/li><li>Penetration testing<\/li><li>Password Manager<\/li><li>Password Cracking<\/li><li>Password Sniffing<\/li><li>Patch<\/li><li>Peer-to-Peer (P2P) Programs<\/li><li>Phishing \/ Smishing<\/li><li>Router<\/li><li>Reporting an incident<\/li><li>Script<\/li><li>Shoulder Surfing<\/li><li>Skimming<\/li><li>Sniffing<\/li><li>Social Engineering<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9392\" aria-expanded=\"false\">Who can Join<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-9392\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-9392\" tabindex=\"0\" hidden=\"hidden\"><div><p><span lang=\"EN-US\">SCSA is for everybody!<\/span><\/p><ul><li><span lang=\"EN-US\">Any individual\u00a0<\/span><\/li><li><span lang=\"EN-US\">Organization<\/span><\/li><li><span lang=\"EN-US\">Government agency<\/span><\/li><li><span lang=\"EN-US\">School students\u00a0<\/span><\/li><li><span lang=\"EN-US\">Homemakers<\/span><\/li><li><span lang=\"EN-US\">School\u00a0and\u00a0college\u00a0administration<\/span><\/li><li><span lang=\"EN-US\">Technically\u00a0and\u00a0non-technically\u00a0inclined\u00a0peoples<\/span><\/li><li><span lang=\"EN-US\">Front\u00a0office\u00a0users\u00a0<\/span><\/li><li><span lang=\"EN-US\">Everyday users of digital technology.<\/span><\/li><li>Software Engineers<\/li><li>Software Developers<\/li><li>System Admins<\/li><li>Managers<\/li><li>Fresh graduates and students<\/li><li>Homemakers willing to make career in IT<\/li><li>Ladies with career break willing to move to IT<\/li><\/ul><\/div><div class=\"ul-li-content-clp\">\u00a0<\/div><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9393\" aria-expanded=\"false\">Course Outcome<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-9393\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-9393\" tabindex=\"0\" hidden=\"hidden\"><p>Here are the benefits of using Software Testing Fundamentals Course<\/p><ul><li>Understanding Cybersecurity Fundamentals<\/li><li>Identifying and Preventing Online Scams<\/li><li>Mobile and Device Security<\/li><li>Cybercrime and Ethical Hacking Insights<\/li><li>Building a Cyber-Resilient Mindset<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9394\" aria-expanded=\"false\">Instructor<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-9394\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-9394\" tabindex=\"0\" hidden=\"hidden\"><p><strong>Ganesh Kannan<\/strong>\u00a0has more than 15 years of IT experience in Software testing, test Consulting, Project and Change management. He has worked for Investment Banks like Barclays Capital and IT services firm like Zensar Technologies. He has managed the testing tools and process function for a top tier investment bank and have managed large off-shore testing teams. He possess extensive project management and consulting experience in delivering IT applications and spearheads the classroom Fundamentals of software testing in Singapore.<\/p><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-74159a3c\" data-id=\"74159a3c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a123784 elementor-widget elementor-widget-heading\" data-id=\"3a123784\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Related Course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b04679 elementor-widget elementor-widget-text-editor\" data-id=\"b04679\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><a style=\"text-decoration: none;\" href=\"https:\/\/www.symbizsolutions.com\/academy\/test-automation-using-selenium-java\/\">Test Automation Using Selenium and Java<\/a><\/li>\n \t<li><a style=\"text-decoration: none;\" href=\"https:\/\/symbizsolutions.com\/academy\/agile-practices-and-delivery\/\">Agile Practices and Delivery<\/a><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38a9de9a elementor-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"38a9de9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-shrink\" href=\"https:\/\/www.symbizsolutions.com\/academy\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">jOIN now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CYBER SECURITY AWARENESS COURSE About the Course Symbiz Academy offers training in CyberSecurity Awareness.The course outline covers essential cybersecurity concepts, including personal and organizational data protection, online and offline identity management, and methods to secure online transactions. It addresses cyber threats like phishing, malware, spoofing, and social engineering while emphasizing practical skills such as mobile [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3363","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/3363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/comments?post=3363"}],"version-history":[{"count":11,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/3363\/revisions"}],"predecessor-version":[{"id":3374,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/3363\/revisions\/3374"}],"wp:attachment":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/media?parent=3363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}