Phishing and Cybersecurity Masterclass Course


Course Cover

Register for this course

We are proud to offer this course in a variety of training formats to suit your needs. We use the highest quality learning facilities to make sure your experience is as comfortable as possible. Our face to face calendar allows you to choose any classroom course of your choice to be delivered at any venue of your choice - offering you the ultimate in convenience and value for money.


June 2024

Code Date Duration Location Fee Action
PCMC3020 24 Jun 2024 - 28 Jun 2024 5 days Nairobi, Kenya KES 83,000 | $1,100 Register
I Want To See More Dates...

Unfortunately, we do not have any dates scheduled at this time. Do you have a date in mind when you would like to take your training?

Request Custom Schedule

Contact Us on (+254) 715 077 817 / (+254) 792 516 000 or email us [email protected].

June 2024

Date
Duration
Location
Fee
Action
24 Jun - 28 Jun 2024
5 days
Nairobi
KES 83,000 $1,100
I Want To See More Dates...

Unfortunately, we do not have any dates scheduled at this time. Do you have a date in mind when you would like to take your training?

Request Custom Schedule

Contact Us on (+254) 715 077 817 / (+254) 792 516 000 or email us [email protected].


Introduction

In the current digital era, where every click and keystroke carries potential risks, it is crucial to grasp the significance of cybersecurity and the deceptive tactics employed by phishing.

Phishing entails the manipulation of individuals into clicking on links contained within fraudulent emails, text messages or instant messages. Consequently, the unsuspecting victim inadvertently exposes sensitive information or installs malicious software on their network, computer or smartphone.

This course will teach you the knowledge and abilities necessary to discern these phishing attempts, prevent cybercriminals, and become secure online. You will delve into the psychology behind phishing, learn to spot warning signs and adopt optimal practices to fortify your digital security. Additionally, you will develop the skill to differentiate authentic emails from impersonations and explore cybercriminals' psychological strategies to exploit our trust.

Enrolling in this training will equip you with the expertise needed to safeguard your personal and professional digital domains.

Duration

5 Days

Who Should Attend:

  • Individuals interested in cybersecurity.
  • IT professionals.
  • Anyone who uses a Computer and Smartphone.

Course Level:

Course Objectives

  • Define phishing and understand its various forms.
  • Recognize common phishing attacks and their characteristics.
  • Identify social engineering techniques used in phishing.
  • Implement strategies to protect against phishing attacks.
  • Understand the role of cybersecurity in safeguarding digital assets.
  • Describe cybersecurity best practices and tools.
  • Recognize the importance of strong passwords and authentication methods.
  • Identify and respond to security incidents.
  • Be aware of emerging cyber threats and trends.
  • Develop a cybersecurity mindset and promote security awareness.

Course Outline

Module 1: Introduction to Cybersecurity

  • What is Cybersecurity
  • The Importance of Cybersecurity
  • Key Cybersecurity Concepts

Module 2: Understanding Phishing

  • What is Phishing
  • Types of Phishing Attacks
  • The Phishing Lifecycle

Module 3: Phishing Techniques and Tactics

  • Email Phishing
  • Spear Phishing
  • Smishing and Vishing
  • Phishing via social media
  • Understanding Honeypot

Module 4: Recognizing Phishing Attempts

  • Identifying Phishing Emails and Social Media Phishing
  • Spotting Fake Websites
  • Analyzing Suspicious Attachments and Links
  • RealWorld Examples of Phishing

Module 5: Protecting Against Phishing

  • Email Security Best Practices
  • Web Browsing Safety
  • Multi-Factor Authentication (MFA)
  • Anti-Phishing Tools and Software

Module 6: Social Engineering and Manipulation

  • Understanding Social Engineering
  • Psychological Tactics Used by Attackers
  • Building a Security-Aware Culture

Module 7: Incident Response and Recovery

  • Developing an Incident Response Plan
  • Responding to a Phishing Incident
  • Recovering from a Phishing Attack

Module 8: Cybersecurity Best Practices

  • Creating Strong Passwords
  • Strategies for not forgetting your password
  • Secure Communication and Encryption
  • Regular Software Updates and Patch Management

Related Courses


Course Administration Details:

METHODOLOGY

The instructor-led training is delivered using a blended learning approach and comprises of presentations, guided sessions of practical exercise, web-based tutorials and group work. Our facilitators are seasoned industry experts with years of experience, working as professional and trainers in these fields.

All facilitation and course materials will be offered in English. The participants should be reasonably proficient in English.

ACCREDITATION

Upon successful completion of this training, participants will be issued with an Indepth Research Institute (IRES) certificate certified by the National Industrial Training Authority (NITA).

TRAINING VENUE

The training will be held at IRES Training Centre. The course fee covers the course tuition, training materials, two break refreshments and lunch.

All participants will additionally cater for their, travel expenses, visa application, insurance, and other personal expenses.

ACCOMMODATION AND AIRPORT PICKUP

Accommodation and airport pickup are arranged upon request. For reservations contact the Training Officer.

Email:[email protected].  

Mob: +254 715 077 817

TAILOR- MADE

This training can also be customized to suit the needs of your institution upon request. You can have it delivered in our IRES Training Centre or at a convenient location.

For further inquiries, please contact us on Tel: +254 715 077 817.

Mobile: +254 792516000+254 792516010 or mail [email protected]

PAYMENT

Payment should be transferred to IRES account through bank before the course start date

Send proof of payment to [email protected]


Share this course:


Related Courses

People who took this course also viewed: