Course Outline
Data safety
- Ways to steal personal data
- Where do we provide our data?
- Data leaks
- What could be the dangers of a leak?
Online payments
- Online payment security
- Fake websites resembling electronic banking or instant payments (Blik, PayU, PayPal)
- Ways of fraud "on Blik"
Internet security
- Social networking sites and privacy on them
- E-mail andphishing- fake invoices, shipping surcharges, etc.
- Software installation from untrusted sources, download agents
Good practices
- What should a good password look like?
- Antivirus software and firewalls
- Security copies
- Data encryption and encrypted communication in everyday use
- System updates
- Remote work security
Requirements
- ability to use a computer and the Internet (browser, e-mail, popular sites, e-banking, etc.)
Audience
- everyone interested in the topic
Testimonials (5)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
examples taken from real life, digressions, exercises were useful plus the opportunity to ask questions at every stage
Karolina - Amer Sports Poland
Course - Governance, Risk Management & Compliance (GRC) Fundamentals
Machine Translated
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.