Nigerian Seminars and Trainings

Search all upcoming seminars, conferences, short management courses and training in Nigeria and around the World

business logo

Internet Security Awareness Training

By: Tom Associates  

Lagos State, Nigeria

07 - 11 May, 2018  5 days

Follow Event

  

NGN 175,000

This Internet Security Awareness Training​ will consist of the following:

DAY ONE

  • Having a security mindset
  • What is Internet Security?
  • What is at risk?
  • Identity theft - people impersonating you
  • Data theft of valuable personal and official data
  • Accounts hacking using loopholes to gain access and commit crime
  • Political damage through carelessness about what you place and share online. (There no delete button on the internet.)
  • What does having a security mindset mean?
  • Understanding How the Internet Works
  • The inter-network of computers and devices reachable from anywhere
  • The technical structure of the internet
  • The critical features of Internet to be aware of:
  • No one is in control
  • Whatever gets on the internet - no true delete option
  • All internet service companies keep a permanent copy of everything
  • People whose full-time job is finding and exploiting Internet loopholes
  • Experts at online fraud and hacking
  • Spywares and malwares to control and monitor your computer without you knowing
  • Porn websites, gambling websites, free downloads websites and free movies websites
  • Take-away Guidelines - Privacy
  • Supplementing Passwords
  • Effectively Erasing Files
  • How Anonymous Are You?
  • Understanding Encryption
  • Protecting Your Privacy
  • Choosing and Protecting Passwords
  • Take-away Guidelines - Email and Communications
  • Understanding your computer: email clients
  • Understanding digital signatures
  • Using instant messaging and chat rooms
  • Caution with email attachments
  • Staying safe on social networking sites
  • Benefits of blind copies (Bcc)
  • Reducing spam
  • Benefits and risks of free email services.

DAY TWO

  • Internet Security Architecture
  • The OSI Reference Model
  • Layer 1: Physical Layer
  • Layer 2: Data Link Layer
  • Layer 3: Network Layer
  • Layer 4: Transport Layer
  • Layer 5: Session Layer
  • Layer 6: Presentation Layer
  • Layer 7: Application Layer
  • Understanding TCP/IP protocols
  • Firewalls and their vital role
  • Setting up proxys and VPN as further protection
  • Authentication and Authorization
  • Classes of Internet Attack
  • Denial of Service Attack
  • IP Spoofing Attack
  • Sniffer Attack
  • Man-in-the-middle Attack
  • Trojan or Backdoor Attack
  • Brute Force Attack
  • Malware Attack
  • DNS Spoofing
  • Injection Attacks
  • Phishing Attacks
  • Cryptographic Attacks
  • Social Engineering Attacks
  • Take-away Guidelines - Attacks and Threats
  • Securing data
  • Handling destructive malware
  • Understanding Hidden Threats: Rootkits and Botnets
  • Dealing with Cyberbullies
  • Identifying Hoaxes and Urban Legends
  • Understanding Corrupted Software Files
  • Recognizing Fake Antiviruses
  • Recognizing and Avoiding Spyware
  • Understanding Denial-of-Service Attacks
  • Avoiding Social Engineering and Phishing Attacks
  • Preventing and Responding to Identity Theft
  • Recovering from Viruses, Worms, and Trojan Horses.

DAY THREE

  • What Should You Do to Be Safe?
  • The right password policy
  • Information governance
  • Effective antivirus with internet protection
  • Updated versions of computer’s operating system
  • Avoid indiscriminate plugging of external storage devices
  • Discipline with movies, music and software online
  • Discipline with social media and professional accounts
  • Discipline with torrent sites
  • Documents back up
  • Appropriate set-up of DMZ, Firewalls and VPNs
  • Take-away Guidelines - Mobile Devices
  • Protecting Portable Devices: Physical Security
  • Holiday Traveling with Personal Internet-Enabled Devices
  • Cybersecurity for Electronic Devices
  • Using Caution with USB Drives
  • Securing Wireless Networks
  • Protecting Portable Devices: Data Security
  • Defending Cell Phones and PDAs Against Attack.

DAY FOUR

  • Recovering from an Attack
  • Resetting accounts immediately
  • Information sharing
  • Ignoring strange messages
  • Setting up Email Signing and Domain Keys Identified Mail
  • Optional configuration of Sender Policy Framework
  • Configuring appropriate firewalls
  • Blocking vulnerable ports
  • Setting up access lists to critical infrastructure
  • MAC hardware address white list
  • Reconfiguring network devices to block exploited loopholes
  • Damage estimating and containment
  • Updating antivirus and full system scan
  • Using signed certificates
  • Biometric authentication
  • Take-away Guidelines - Safe Browsing
  • Shopping Safely Online
  • Understanding Bluetooth Technology
  • Understanding Web Site Certificates
  • Avoiding Copyright Infringement
  • Understanding Your Computer: Web Browsers
  • Understanding Internationalized Domain Names
  • Evaluating Your Web Browser's Security Settings
  • Browsing Safely: Understanding Active Content and Cookies
  • Take-away Guidelines - Software and Apps
  • Understanding Voice over Internet Protocol (VoIP)
  • Risks of File-Sharing Technology
  • Reviewing End-User License Agreements
  • Understanding Your Computer: Operating Systems
  • Understanding Patches

DAY FIVE

  • General Security
  • Before You Connect a New Computer to the Internet
  • Securing Your Home Network
  • Prepare for Heightened Phishing Risk
  • International Mobile Safety Tips
  • Real-World Warnings Keep You Safe Online
  • Understanding Anti-Virus Software
  • Understanding Firewalls
  • Good Security Habits
  • Coordinating Virus and Spyware Defense
  • Safeguarding Your Data
  • General Information
  • Understanding Internet Service Providers (ISPs)
  • Guidelines for Publishing Information Online.
5/7 Alade Lawal Street, Opposite Divisional Police Station, Off Ikorodu Road, Anthony, Lagos. May 07 - 11 May, 2018

Registration: 08:30:am - 09:00:am

Class Session: 09:00:am - 04:00:am

NGN 175,000.00
(Convert Currency)

Mr Abiodun Toki 08033019120

Discount of 5% to 3-4 participants from same organization. Discount of 10% to 5 or more participants from same organization.
Related Courses
Contract Management Course Contract Management Course

4 days, 04 - 07 Dec, 2018 

2018-12-04 12:12:00
Lagos State, Nigeria

Tom Associates

Organizations need effective contract management practices to avoid risk and achieve optimal outcomes. This course provides the knowledge and skills to successfully manage and execute the contracting ...

Effective Management of Time, Priority and Work Pressure Course Effective Management of Time, Priority and Work Pressure Course

3 days, 12 - 14 Dec, 2018 

2018-12-12 12:12:00
Lagos State, Nigeria

Tom Associates

Managers and executives must consistently add more value, in the limited time they have in hand, just to remain in contention today. To achieve more than the ordinary, managers must have the special ...

Job Hazard Analysis Training: Health and Safety Hazards at SME’s Worksites Job Hazard Analysis Training: Health and Safety Hazards at SME’s Worksites

2 day, 01 - 02 Nov, 2018 

2018-11-01 12:11:00
Lagos State, Nigeria

Tom Associates

This job hazard analysis training: health and safety hazards at SME’s worksites training course will discuss: Day One What is Job Hazard Analysis? Why Conduct a Job Hazard Analysis? Hazard ...

Business Acumen Master Class: Transformative Learning of How the Business Makes Money Business Acumen Master Class: Transformative Learning of How the Business Makes Money

3 days, 17 - 19 Oct, 2018 

2018-10-17 12:10:00
Lagos State, Nigeria

Tom Associates

Business Acumen is all about seeing the big picture and recognizing that all decisions no matter how small can have an effect on the bottom line. Therefore the focus of this course is to prepare ...