Cybersecurity Awareness – BASIC

37,50 

In an increasingly interconnected world, cybersecurity has become a critical priority for protecting your personal and business information. This course is designed to provide you with a solid foundation to navigate safely online and safeguard your digital assets.

Throughout the course, you will explore everything from the basic concepts of cybersecurity to the most common threats we face in the digital world, with real-world examples that will help you understand cyber threats more effectively.

You will be introduced to key concepts such as confidentiality, integrity, and availability of information, as well as the actors and motivations behind cyberattacks. You will learn to identify common threats like trojans and ransomware and stay safe from phishing and other attacks through practical exercises.

Choose whether you want to apply for a FUNDAE grant or not, and if so, how you want to handle the process

We handle your FUNDAE grant (+10% of the course value)

Order total:
Category:

COURSE PROGRAM

  1. Introduction to Cybersecurity (basic concepts and terminology)
    • Security concepts in information systems
    • Main characteristics
  2. Information: confidentiality, integrity, and availability
    • Confidentiality
    • Integrity
    • Availability
  3. Who wants our personal and/or corporate information and why
    • Motivations
    • Evidence
    • Reflections on cybersecurity
  4. Main threats
  5. Malicious software (Trojans, Ransomware)
    • Concepts
    • Classification of malicious software
  6. In search of your credentials (phishing)
  7. Email as an attack vector
  8. Potential impact of a cyber incident
  9. Best practices for employees: safe use of PCs and mobile devices in personal environments, safe use of a workstation and corporate mobile device, safe use of email
    • Protective measures
    • User access control to the operating system
    • Safe use of email
    • Protection against malicious code
    • Responsible browsing
  10. Responsible browsing
  11. What to do in case of a cyber incident
Condiciones Generales: View file

Location

View on Google Maps