Nigerian Seminars and Trainings

Search conferences, training, seminars, courses and workshops in Nigeria and around the world

business logo

Internet Security Awareness Training

By: Tom Associates  

Lagos State, Nigeria

07 - 11 May, 2018  5 days

Follow Event

  

NGN 175,000

This Internet Security Awareness Training​ will consist of the following:

DAY ONE

  • Having a security mindset
  • What is Internet Security?
  • What is at risk?
  • Identity theft - people impersonating you
  • Data theft of valuable personal and official data
  • Accounts hacking using loopholes to gain access and commit crime
  • Political damage through carelessness about what you place and share online. (There no delete button on the internet.)
  • What does having a security mindset mean?
  • Understanding How the Internet Works
  • The inter-network of computers and devices reachable from anywhere
  • The technical structure of the internet
  • The critical features of Internet to be aware of:
  • No one is in control
  • Whatever gets on the internet - no true delete option
  • All internet service companies keep a permanent copy of everything
  • People whose full-time job is finding and exploiting Internet loopholes
  • Experts at online fraud and hacking
  • Spywares and malwares to control and monitor your computer without you knowing
  • Porn websites, gambling websites, free downloads websites and free movies websites
  • Take-away Guidelines - Privacy
  • Supplementing Passwords
  • Effectively Erasing Files
  • How Anonymous Are You?
  • Understanding Encryption
  • Protecting Your Privacy
  • Choosing and Protecting Passwords
  • Take-away Guidelines - Email and Communications
  • Understanding your computer: email clients
  • Understanding digital signatures
  • Using instant messaging and chat rooms
  • Caution with email attachments
  • Staying safe on social networking sites
  • Benefits of blind copies (Bcc)
  • Reducing spam
  • Benefits and risks of free email services.

DAY TWO

  • Internet Security Architecture
  • The OSI Reference Model
  • Layer 1: Physical Layer
  • Layer 2: Data Link Layer
  • Layer 3: Network Layer
  • Layer 4: Transport Layer
  • Layer 5: Session Layer
  • Layer 6: Presentation Layer
  • Layer 7: Application Layer
  • Understanding TCP/IP protocols
  • Firewalls and their vital role
  • Setting up proxys and VPN as further protection
  • Authentication and Authorization
  • Classes of Internet Attack
  • Denial of Service Attack
  • IP Spoofing Attack
  • Sniffer Attack
  • Man-in-the-middle Attack
  • Trojan or Backdoor Attack
  • Brute Force Attack
  • Malware Attack
  • DNS Spoofing
  • Injection Attacks
  • Phishing Attacks
  • Cryptographic Attacks
  • Social Engineering Attacks
  • Take-away Guidelines - Attacks and Threats
  • Securing data
  • Handling destructive malware
  • Understanding Hidden Threats: Rootkits and Botnets
  • Dealing with Cyberbullies
  • Identifying Hoaxes and Urban Legends
  • Understanding Corrupted Software Files
  • Recognizing Fake Antiviruses
  • Recognizing and Avoiding Spyware
  • Understanding Denial-of-Service Attacks
  • Avoiding Social Engineering and Phishing Attacks
  • Preventing and Responding to Identity Theft
  • Recovering from Viruses, Worms, and Trojan Horses.

DAY THREE

  • What Should You Do to Be Safe?
  • The right password policy
  • Information governance
  • Effective antivirus with internet protection
  • Updated versions of computer’s operating system
  • Avoid indiscriminate plugging of external storage devices
  • Discipline with movies, music and software online
  • Discipline with social media and professional accounts
  • Discipline with torrent sites
  • Documents back up
  • Appropriate set-up of DMZ, Firewalls and VPNs
  • Take-away Guidelines - Mobile Devices
  • Protecting Portable Devices: Physical Security
  • Holiday Traveling with Personal Internet-Enabled Devices
  • Cybersecurity for Electronic Devices
  • Using Caution with USB Drives
  • Securing Wireless Networks
  • Protecting Portable Devices: Data Security
  • Defending Cell Phones and PDAs Against Attack.

DAY FOUR

  • Recovering from an Attack
  • Resetting accounts immediately
  • Information sharing
  • Ignoring strange messages
  • Setting up Email Signing and Domain Keys Identified Mail
  • Optional configuration of Sender Policy Framework
  • Configuring appropriate firewalls
  • Blocking vulnerable ports
  • Setting up access lists to critical infrastructure
  • MAC hardware address white list
  • Reconfiguring network devices to block exploited loopholes
  • Damage estimating and containment
  • Updating antivirus and full system scan
  • Using signed certificates
  • Biometric authentication
  • Take-away Guidelines - Safe Browsing
  • Shopping Safely Online
  • Understanding Bluetooth Technology
  • Understanding Web Site Certificates
  • Avoiding Copyright Infringement
  • Understanding Your Computer: Web Browsers
  • Understanding Internationalized Domain Names
  • Evaluating Your Web Browser's Security Settings
  • Browsing Safely: Understanding Active Content and Cookies
  • Take-away Guidelines - Software and Apps
  • Understanding Voice over Internet Protocol (VoIP)
  • Risks of File-Sharing Technology
  • Reviewing End-User License Agreements
  • Understanding Your Computer: Operating Systems
  • Understanding Patches

DAY FIVE

  • General Security
  • Before You Connect a New Computer to the Internet
  • Securing Your Home Network
  • Prepare for Heightened Phishing Risk
  • International Mobile Safety Tips
  • Real-World Warnings Keep You Safe Online
  • Understanding Anti-Virus Software
  • Understanding Firewalls
  • Good Security Habits
  • Coordinating Virus and Spyware Defense
  • Safeguarding Your Data
  • General Information
  • Understanding Internet Service Providers (ISPs)
  • Guidelines for Publishing Information Online.
5/7 Alade Lawal Street, Opposite Divisional Police Station, Off Ikorodu Road, Anthony, Lagos. May 07 - 11 May, 2018

Registration: 08:30:am - 09:00:am

Class Session: 09:00:am - 04:00:am

NGN 175,000.00
(Convert Currency)

Mr Abiodun Toki 08033019120

Discount of 5% to 3-4 participants from same organization. Discount of 10% to 5 or more participants from same organization.
Related Courses
Aggressive Market Penetration: Battles for Market Share Aggressive Market Penetration: Battles for Market Share

4 days, 26 - 29 Jun, 2018 

2018-06-26 12:06:00
Lagos State, Nigeria

Tom Associates

A four-day sales and marketing training on intense and offensive market drive.  With speed, the sales and marketing persons must: Generate awareness for the company’s products Achieve ...

New Approach to Documents Control and Records Management New Approach to Documents Control and Records Management

5 days, 02 - 06 Jul, 2018 

2018-07-02 12:07:00
Lagos State, Nigeria

Tom Associates

Document Control and Records Management are a very important part of any management system. Records are needed for identification and evidence of transactions for government and private businesses. ...

Strategic Managerial Accounting: Cost Behaviors, Systems and Analysis Strategic Managerial Accounting: Cost Behaviors, Systems and Analysis

3 days, 11 - 13 Jun, 2018 

2018-06-11 12:06:00
Lagos State, Nigeria

Tom Associates

This course presents how Strategic Managerial Accounting primarily links the goals of the organization with its analysis of cost accounting as well as its management information systems. But beyond ...

Mastering Competitive Positioning, Blue Ocean Strategy and Value Chain Management Mastering Competitive Positioning, Blue Ocean Strategy and Value Chain Management

3 days, 08 - 10 Aug, 2018 

2018-08-08 12:08:00
Lagos State, Nigeria

Tom Associates

How does the management find a unique positioning, the “place” the organization should be in the industry? That is discovering a good strategy. In your arena of tough business rivalry, ...