{"id":599,"date":"2020-08-29T03:03:32","date_gmt":"2020-08-29T03:03:32","guid":{"rendered":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/"},"modified":"2020-12-04T03:07:00","modified_gmt":"2020-12-04T03:07:00","slug":"cyber-security","status":"publish","type":"product","link":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity. With our \u201cCyber Security\u201d workshop, your participants will discover the fundamentals of Cyber Security as well as the methods that should be implemented to make sure their computer systems are protected<b><\/b><\/p>\n<p><strong>Designed for<\/strong><\/p>\n<ul>\n<li>Technical teams supporting web based solutions.<\/li>\n<li>Managers and leaders wanting to understand the role of Cyber Security.<\/li>\n<li>Teams in a technology area that are new to security aspects.<\/li>\n<\/ul>\n<p><strong>Learning Objectives<\/strong><\/p>\n<p>By the end of this workshop, you should be able to:<\/p>\n<p>Understand different types of malware and security breaches.<\/p>\n<p>Know the types of Cyber attacks to look out for.<\/p>\n<p>Develop effective prevention methods.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Getting Started<\/strong><\/p>\n<p>Just to make sure the experience is as smooth as possible we\u2019d like to suggest a couple of things you may or will need to get on with the course:<\/p>\n<ul>\n<li>While we are happy for anyone to enroll in the course, we suggest that you should be at least managing\/leading a team (big or small) or preparing for a role that requires your leadership skills<\/li>\n<li>Internet connection is a big must<\/li>\n<li>Readiness to learn, remember this is about you and so you need to be ready to take time to yourself and motivate yourself<\/li>\n<li>Maybe something to write some notes down or ideas, but don\u2019t worry the course documents can be downloaded at the end of the course for you to review and use at any time<\/li>\n<\/ul>\n<p>Have fun!<\/p>\n<p>&nbsp;<\/p>\n<h3>The Journey<\/h3>\n<p><b>Cyber Security Fundamentals<\/b><\/p>\n<p><i><b>What\u2019s in it for me:<\/b><\/i>\u00a0Get started with learning about what is Cyber Security \u2013 the fundamentals, why it Is needed, what is hacking and the importance of security in Cyber world.<\/p>\n<p>Videos: 6\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 Self Assessment: 3\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Checklist: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>\u00a0Malware<\/b><\/p>\n<p><i><b>What\u2019s in it for me<\/b><\/i>:\u00a0Learn about what Malware is in the cyber language, the different types of malware and what they do.<\/p>\n<p>Videos: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Self Assessment: 0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Checklist: 0\u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>Cyber Security Breaches\u00a0<\/b><\/p>\n<p><i><b>What\u2019s in it for me:<\/b><\/i>\u00a0Learn about all the types of cyber breaches that are common in cyber hacks, the differences between them and how they affect your business.<\/p>\n<p>Videos: 16\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 Self Assessment: 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Check list: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>Types of Cyber Attacks\u00a0<\/b><\/p>\n<p><i><b>What\u2019s in it for me<\/b><\/i>:\u00a0Learn about the various types of attacks and penetration tests performed to ensure the attacks can be avoided.<\/p>\n<p>Videos: 6\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 Self Assessment: 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Check list: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>Prevention Tips\u00a0<\/b><\/p>\n<p><b><i>What\u2019s in it for me:<\/i><\/b>\u00a0In this session learn how to create touch passwords and verification processes to be built into your technology platforms. We discuss the legitimacy of websites and how to watch out for unauthorized accesses.<\/p>\n<p>Videos: 6\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 Self Assessment: 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Check list: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>Mobile Protection\u00a0<\/b><\/p>\n<p><b><i>What\u2019s in it for me<\/i><\/b>:\u00a0Get aware and familiar with the protection mechanisms to implement into your website and systems, form card numbers, phone locking to saving of passwords.<\/p>\n<p>Videos: 6\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 Self Assessment: 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Check list: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>Social Network Security\u00a0<\/b><\/p>\n<p><i><b>What\u2019s in it for me<\/b><\/i>:\u00a0In this session, we cover the social network security aspects which many people fall prey to. Here you will learn about the personal information protection and profile links and account locks.<\/p>\n<p>Videos: 6\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 Self Assessment: 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Check list: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>Prevention Software\u00a0<\/b><\/p>\n<p><b><i>What\u2019s in it for me:<\/i><\/b>\u00a0This session covers the network and software prevention systems from firewalls to Virtual networks, routine updates and suing anti spyware and viruses software.<\/p>\n<p>Videos: 6\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 Self Assessment: 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Check list: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>Critical Cyber Threats\u00a0<\/b><\/p>\n<p><strong><i>What\u2019s in it for me<\/i>:<\/strong>\u00a0Learn about all the critical cyber threats that are in existence, from cyber terrorism, warfare, to espionage.<\/p>\n<p>Videos: 6\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 Self Assessment: 4\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 Check list: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 1<\/p>\n<p>&nbsp;<\/p>\n<p><b>Defense Against Hackers<\/b><\/p>\n<p><strong><i>What\u2019s in it for me<\/i>:<\/strong>\u00a0Finally in this session, we get to the digital forensics and intrusion detection systems. How to take legal recourse and the role of cryptography.<\/p>\n<p>Videos: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Self Assessment: 0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Check list: 1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exercise: 0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With our \u201cCyber Security\u201d workshop, your participants will discover the fundamentals of Cyber Security as well as the methods that should be implemented to make sure their computer systems are protected<\/p>\n","protected":false},"featured_media":931,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":""},"product_cat":[39],"product_tag":[56],"class_list":{"0":"post-599","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-technologyprojectmanagement","7":"product_tag-cyber-security","9":"first","10":"instock","11":"sale","12":"downloadable","13":"virtual","14":"sold-individually","15":"purchasable","16":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security - Devyani Patel<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - Devyani Patel\" \/>\n<meta property=\"og:description\" content=\"With our \u201cCyber Security\u201d workshop, your participants will discover the fundamentals of Cyber Security as well as the methods that should be implemented to make sure their computer systems are protected\" \/>\n<meta property=\"og:url\" content=\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Devyani Patel\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-04T03:07:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/driventoleadcoaching.com\/wp-content\/uploads\/2020\/08\/Cyber_Security2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1187\" \/>\n\t<meta property=\"og:image:height\" content=\"1063\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/\",\"url\":\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/\",\"name\":\"Cyber Security - Devyani Patel\",\"isPartOf\":{\"@id\":\"https:\/\/driventoleadcoaching.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/driventoleadcoaching.com\/wp-content\/uploads\/2020\/08\/Cyber_Security2.png\",\"datePublished\":\"2020-08-29T03:03:32+00:00\",\"dateModified\":\"2020-12-04T03:07:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#primaryimage\",\"url\":\"https:\/\/driventoleadcoaching.com\/wp-content\/uploads\/2020\/08\/Cyber_Security2.png\",\"contentUrl\":\"https:\/\/driventoleadcoaching.com\/wp-content\/uploads\/2020\/08\/Cyber_Security2.png\",\"width\":1187,\"height\":1063},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/driventoleadcoaching.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/driventoleadcoaching.com\/#website\",\"url\":\"https:\/\/driventoleadcoaching.com\/\",\"name\":\"Devyani Patel\",\"description\":\"Driven to Lead Coaching &amp; Development\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/driventoleadcoaching.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - Devyani Patel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - Devyani Patel","og_description":"With our \u201cCyber Security\u201d workshop, your participants will discover the fundamentals of Cyber Security as well as the methods that should be implemented to make sure their computer systems are protected","og_url":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/","og_site_name":"Devyani Patel","article_modified_time":"2020-12-04T03:07:00+00:00","og_image":[{"width":1187,"height":1063,"url":"https:\/\/driventoleadcoaching.com\/wp-content\/uploads\/2020\/08\/Cyber_Security2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/","url":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/","name":"Cyber Security - Devyani Patel","isPartOf":{"@id":"https:\/\/driventoleadcoaching.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/driventoleadcoaching.com\/wp-content\/uploads\/2020\/08\/Cyber_Security2.png","datePublished":"2020-08-29T03:03:32+00:00","dateModified":"2020-12-04T03:07:00+00:00","breadcrumb":{"@id":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/driventoleadcoaching.com\/product\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#primaryimage","url":"https:\/\/driventoleadcoaching.com\/wp-content\/uploads\/2020\/08\/Cyber_Security2.png","contentUrl":"https:\/\/driventoleadcoaching.com\/wp-content\/uploads\/2020\/08\/Cyber_Security2.png","width":1187,"height":1063},{"@type":"BreadcrumbList","@id":"https:\/\/driventoleadcoaching.com\/product\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/driventoleadcoaching.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/driventoleadcoaching.com\/#website","url":"https:\/\/driventoleadcoaching.com\/","name":"Devyani Patel","description":"Driven to Lead Coaching &amp; Development","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/driventoleadcoaching.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/driventoleadcoaching.com\/wp-json\/wp\/v2\/product\/599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/driventoleadcoaching.com\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/driventoleadcoaching.com\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/driventoleadcoaching.com\/wp-json\/wp\/v2\/comments?post=599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/driventoleadcoaching.com\/wp-json\/wp\/v2\/media\/931"}],"wp:attachment":[{"href":"https:\/\/driventoleadcoaching.com\/wp-json\/wp\/v2\/media?parent=599"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/driventoleadcoaching.com\/wp-json\/wp\/v2\/product_cat?post=599"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/driventoleadcoaching.com\/wp-json\/wp\/v2\/product_tag?post=599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}