End-User Security: Protecting Your Online Footprint

DATE

Duration

LOCATION

FEES

Book Now

4 Mar
- 8 Mar 2024

5 Days

Dubai

$4,250

2 Sep
- 6 Sep 2024

5 Days

Dubai

$4,250

23 Jun
- 27 Jun 2024

5 Days

Virtual Online

$3,450

25 Nov
- 29 Nov 2024

5 Days

Virtual Online

$3,450

A digital footprint refers to the trail of data you leave when using the internet. It includes websites you visit, emails you send, and information you submit online. A digital footprint can be used to track a person’s online activities and devices. Internet users create their digital footprint either actively or passively.

This course is designed to show how easy it can be for others to obtain data about ourselves through various means, but also how much of this can be stopped with a few tweaks to our machines and our online behavior. This course provides a strong foundation on the fundamentals of cybersecurity, taking you through cyber risks, how to protect against them, and how cybercriminals can use their target’s digital footprint to find exploits.

By the end of the course, you‘ll be able to:

  • Understand the latest risks involved in using the technology available in today’s workplaces
  • How to become an active contributor to the security of your company’s assets
  • Recognize insider threats and close the door on intruders
  • Securing your devices and accommodating remote work locations responsible use of the Internet
  •  Understand Internet foundations, domain name system, Traceroute, Internet analysis, search engines, Tools for finding information on people and companies, username searchers, email lookups, disposable emails, passwords, internet communities and culture

This course is made for :

  • IT specialist
  • Mobile devices developers
  • Software designers
  • Web applications developers
  • Electronic designers

Day One

  • Introduction to cybersecurity
  • Why does your online footprint matter?
  • Possible hacking methods

Day Two

  • Security fundamentals
  • Traffic analysis
  • Responding to Threats and Attacks

Day Three

  • Cyber Awareness: Policies and Procedures
  • Security Policy Topics
  • Advanced Attack Techniques and Tools

Day Four

  • Password Attacks
  • Privilege Escalation
  • Maintaining Access
  • Windows Authentication

Day Five

  • Devices
  • Routers
  • Firewalls
  • Incident Handling Issues and Considerations
Training Subject
Training Location