FAQ

FAQ

  • Security policy View Close

    Illustrates the importance of organization security policy and demonstrates in detail your organizations security policies.  This topic will help organizations to emphasis on their employees to know what are the polices and adhere them.

    Protecting your computer View Close

    This topic emphasizes on your computer threats and risks. What are the best practices to protect your computer?

    Physical security View Close

    This topic illustrates the most important types of risks that threaten the physical security of your organization. Also, demonstrates real example of physical attacks. And provides international best practices that will insure the physical security of your organization.

    Wireless security View Close

    Nowadays WiFi network are available everywhere for free, which allow people to wirelessly connect their devices to the internet, such as Smartphone, gaming consoles, laptops, and other.  Yet there are many security risks that many are not aware of when connect to a WiFi network.  This topic will demonstrate examples of WiFI attacks and will provide the best practices to protect your personal WiFi network

    Mobile security View Close

    Mobile Devices are one of the primary devices we use daily at work, home and when we travel. However, with the emergence of new applications came number of risks that users should be aware of.  This topic will cover the dangers of mobile device applications, install and maintain mobile device securely according to best practices.

    Confidential data View Close

    This topic focuses on the privacy on data and why data protection is important? Also, Points out best practices in data protection and data classification.

    Encryption View Close

    What is Encryption? How could encryption protect your information? Why is it important to use encryption? Illustrates different encryption methods and tools.

    Passwords View Close

    Password is the key to your information. This topic focuses on the importance of password and how your password could lead to identify theft, fraud and blackmailing. Also, it will point out password security best practices.

    Securing your browser View Close

    Web browser is one of the primary tools to access the Internet. Many Internet users have basic knowledge about the browsers and how to use it, but many have no clue that the browser logs a great deal of personal information. It’s considered as one of the primary targets for cyber criminals to export their attacks through phishing sites and others. This topic will focus on different kind of browser threats and provide protection methods to maintain your privacy through the web.

    Securing email View Close

    Email is one of main communication channel these days, and become a source for the cyber criminals to export threats such as phishing emails.  This topic will focus on Email security, and threats such as phishing and spam. Finally, provide protection and detection methods against email threats.

    Social engineering View Close

    Defines the terminology of social engineering? Different Types of social engineer attacks? Also, illustrates real examples and scenarios of social engineering attacks. Detection techniques will be demonstrated in details against such attacks.

    You are the target View Close

    Addresses the importance of information Security Awareness, What is information security? And why each one of us is targeted? Also, Illustrates examples of online threats such as fraud website and online scams. Focus on security and privacy aspects. Then, raps up with security best practices and methods of securing your information against online threats.

    Security first: Critical infrastructure protection View Close

    The critical infrastructure of a country is the combination of complex and interdependent physical and technology-based assets, essential to the operations of a country's economy and government. Nowadays these assets have become increasingly automated and interlinked, which have created new vulnerabilities. This topic will focus on addressing these vulnerabilities and advanced approaches that are required to protect critical infrastructure.

    The CIA triad: Confidentiality, Integrity and availability View Close

    This topic will discuss the importance of confidentiality, integrity and availability (CIA) of information regardless of its form i.e. electronic, print, etc.

    Defense in depth and defense in breadth View Close

    This topic will discuss what defense in depth and defense in breadth is, how they were developed and what was the aim behind it. The topic will focus on how defense in depth and defense in breadth defends key assets by creating different layers of defense and systematically reducing risks respectively.

    Operations security - Physical and technical controls View Close

    Operational security is meant to protect resources such as system hardware, software, network components, databases and people. The topic will discuss different types of security controls with a focus on physical and technical controls. Physical controls are measures to control physical access to sensitive information. The technical controls are measures that protect the confidentiality, integrity and availability of sensitive information.

    Information risk management View Close

    Managing information risk is one of the most important business concerns for an organization. This topic will focus on the risk management process model, information risk management process components (Identify, Analyze, Control, Monitor and Report) and information risk management process framework.

    Denial of service attacks - Types, signs and how to protect View Close

    DoS is one of the most critical attacks having most devastating effects. This topic will discuss what Denial of Service actually is, what are its attack mechanisms, importance of such attacks and its impact. The topic will also cover how to detect, mitigate and defend against Denial of Service attacks. 

    Cloud security View Close

    Cloud has changed the dynamics of how users and organizations store and process their information. This topic explains what is cloud, How it changes the way data is stored and applications are run. It will further explain the kind of threats that can affect cloud and how to secure it.

    e-Payments security View Close

    The number of private and corporate financial transactions that are done electronically is growing rapidly. This topic provides overview of how e-Payments work? What are the different standards of e-payments security? What is PCI-DSS? What is 3-D secure? What is CVV code? What is AVS?

    Securing the online family: Social network security View Close

    Social networking is so popular that we often find all the members in family using social networking websites. This topic covers the basics of how you can keep your family information secure online? How you can monitor and teach your kids about such threats.

    Social Network Security explains the threats against your privacy on social networks including Facebook, Twitter and Google+. And how you can protect against those threats by properly configuring your privacy options.

    BYOD security View Close

    Bring your own device. This topic explains the terminology BYOD. What are the threats associated? Provides information on how one organization can secure their BYOD program without affecting productivity of employees or network users.

    Mobile computing security : m-Gov security View Close

    Mobile computing devices are in massive use, getting smarter and can store large amounts of data. They are highly portable but frequently unprotected. This topic enlists different types of mobile computing devices, threats associated to them and how to secure them. Also points out security best practices related to m-government applications and services.

    Malware View Close

    Defines terminologies of various types of viruses, malware, Trojans, and their differences. How does each affect our computer systems and data. Kind of threat these malicious programs pose to a common computer user and how can we protect against each one of them.