Security Awareness Topics

You Are The Target

Addresses the importance of information Security Awareness, what is information security, and why each one of us is targeted. Also, it illustrates examples of online threats such as fraud website and online scams, with focus on security and privacy aspects. Then, it raps up with security best practices and methods of securing your information against online threats.

Protecting Your Computer

This topic emphasizes on your computer threats and risks, and identifies best practices to protect your computer.

Social Engineering

This topic defines the terminology of social engineering, different types of social engineer attacks, and illustrates real examples and scenarios of social engineering attacks. Detection techniques will be demonstrated in details against such attacks.

Securing Email

Email is one of the main communication channels nowadays days; nevertheless, it has become a source for cyber criminals to export threats such as phishing emails. This topic will focus on Email security, and threats such as phishing and spam. Finally, it will provide protection and detection methods against email threats.

Securing Your Browser

Web browser is one of the primary tools to access the internet. Many internet users have basic knowledge about the browsers and how to use it, but many have no clue that the browser logs a great deal of personal information. It is considered one of the primary targets for cyber criminals to export their attacks through phishing sites and others. This topic will focus on different kinds of browser threats and provide protection methods to maintain your privacy through the web.

Confidential Data

This topic focuses on the privacy on data and the importance of data protection. In addition, it identifies best practices in data protection and data classification.

Mobile Security

Mobile Devices are among the primary devices we use daily at work, home and when we travel. However, with the emergence of new applications, came number of risks that users should be aware of. This topic will cover the dangers of mobile device applications, as well as installing and maintaining mobile device securely according to best practices.

Malware

This topic defines terminologies of various types of viruses, malware, Trojans, and their differences. It clarifies how they affect our computer systems and data, kind of threats these malicious programs pose to a common computer user, and how can we protect against each one of them.

Securing the Online Family: Social Network Security

Social networking is so popular that we often find all the members in family using social networking websites. This topic covers the basics of how you can keep your family information secure online, and how you can monitor and teach your kids about such threats.

Social Network Security explains the threats against your privacy on social networks including Facebook, Twitter and Google+, and how you can protect against those threats by properly configuring your privacy options.

e-Payments Security

The number of private and corporate financial transactions that are done electronically is growing rapidly. This topic provides overview of how e-Payments work, the different standards of e-payments security, PCI-DSS, 3-D secure, CVV code, and AVS.

Operations Security - Physical and Technical Controls

Operational security aims to protect resources such as system hardware, software, network components, databases and people. This topic will discuss different types of security controls with a focus on physical and technical controls. Physical controls are measures to control physical access to sensitive information. The technical controls are measures that protect the confidentiality, integrity and availability of sensitive information.

Physical Security

This topic illustrates the most important types of risks that threaten the physical security of your organization. Also, demonstrates real examples of physical attacks, and provides international best practices that will ensure the physical security of your organization.