Cyber Security Solution — Training and Certification (CSPC) Over 95% of cyber attacks occur because of human error Technology alone is not enough to prevent major data breaches
cyber security experts and cyber industry professionals, including
and cyber attacks. Security is dependent on employee education
trainers and developers from the elite Israeli Cyber Units, and we
and training. Cybersecurity is one of the fastest growing industries
are aligned with the NICE framework.
and sensitive topics across nearly all professional sectors.
From governments to corporations, we are approved,
Whether you’re a national, state or local government entity,
and used by, the Department of Homeland Security,
private enterprise, academic institution, or military or para-military
Department of Justice, FBI, FINRA, and Bank of America.
organization, your assets and employees are inherently at risk 24/7.
Our solution is designed to train your team on cyber security
Understanding the cyber terminology, threats and
awareness (protection). While your organization may have robust
opportunities is now vital for all employees.
IT protections around your data systems, you can’t control the
That is where the Cybint–Odigia partnership comes in. Our partnership provides training, certifications and learning solutions across the cyber security and intelligence spectrum in an easyto-use platform. It’s capable of training an audience of any size
online practices of the people who access them. Cybint Security (Protection) is the leading cyber security program in the cyber education industry. Our program is the product of a collaboration between military-trained cyber security experts and education experts around the globe. When your employees receive a Cyber
and providing unmatched measurement and benchmarking
Security Protection Certification from Cybint delivered on the
capabilities to ensure trainees are completing training and
Odigia technology platform, you will know that they have acquired
fully comprehending it. We believe that protecting our assets,
unique knowledge and skills that are critical for you and your
companies and national security starts with tested and proven
clients. This will differentiate your organization from others in the
training. Our solutions are a collaboration between military-trained
market and provide distinct operational advantages.
ODIGIA.COM/CYBINT
© 2018 BARBRI, Inc. All rights reserved | 096-17
About the CSPC Solution:
TRAINING
ASSESSMENT
CERTIFICATE
TOOLS
At its core, the Cyber Security (Protection) solution consists of training, assessment, certification and tools that will teach your employees how to improve their online security practices. The program addresses cyber security at the employee level — creating a deep and powerful network of cyber security expertise beyond the typical technical expertise. Your team will have access to these materials for 12 months following purchase. Your purchase includes updates and new materials that will be automatically uploaded to the system. The Cybint Security program features more than 60 learning units, each less than 10 minutes long. The package focuses on various aspects of cyber security, and contains exclusive live webinars on emerging cyber topics. The Cyber Security (Protection) program focuses on behaviors that may put your company at risk. Upon completion of training, there is a certification exam to verify learning and identify areas that require more study.
A set of 10 assessments allows you to identify your employees’ gaps in cyber security, measure ongoing improvement and identify areas that require more study. The final exam will grant your employees the exclusive Cyber Security (Protection) certification.
ODIGIA.COM/CYBINT
© 2018 BARBRI, Inc. All rights reserved | 096-17
HOW IT WORKS: Throughout the Cyber Security (Protection) program, each module is concluded with a set of comprehensive review questions to effectively assess a learners’ comprehension and recall of the material presented. Each question includes feedback to a learner’s response to reinforce their learning and contribute to their knowledge retention. This solution is designed to track the advancement of each learner, allowing you to view their progress at any point through the program dashboard. In addition, designated administrators may also track user progress, including quiz scores and module completion. This function is ideal for organizations that wish to administer training internally. CERTIFICATION (CSPC): LEARNING METHODOLOGY:
Following the completion of the training, the learner can take the
The program is based on the micro-learning concept, with short
final exam, and earn a Cyber Security (Protection) Certification.
learning units (5-10 minutes each). The self-paced, interactive
Once the learners have passed the final exam, they will receive an
program first provides the theoretical background and knowledge,
e-certification with the title: Cyber Security Protection Certified
then demonstrates how they are used, and finally allows your
(CSPC). These initials will not only showcase their competence
team to practice their newly gained skills.
in cyber security, but will distinguish your business from others
The 10 modules of the Cyber Security (Protection) program cover all aspects of cyber security. The learners don’t have to follow the specific order of the program, although we recommend they do
in the industry. In addition to the training and certification, your employees will also have access to our advanced toolkit that allows them to implement in real life what they have learned.
so for a better learning experience.
ODIGIA.COM/CYBINT
© 2018 BARBRI, Inc. All rights reserved | 096-17
TRAINING OVERVIEW: CYBER SECURITY
MODULE 1: INTRODUCTION TO CYBER SECURITY PROTECTION
MODULE 4: SECURITY – WARES, VIRUSES, ATTACKS
• Web Exploits • Cookies
• Introduction to Cyber Security
• Viruses VS Malwares
• Web Browsers
• The Internet
• Ransomware
• Advanced Tools
• IP, MAC and DNS
• Spyware & Trojan Horse
• The Weakest Link
• Adware
• The Reach-Breach Concept
• Denial of Service
• The Cyberspace
• Software Exploit
• Cloud - How it Works and
• Antiviruses, Anti-Malwares & Firewalls
MODULE 8: MOBILE SECURITY • The Mobile Paradox • Steps to Protect Your Mobile Phone MODULE 9: HARDWARE EXPLOITS
Cloud Security
• Prevention
• USB Drives
• Routers and WiFi
• Detection
• Remote Takeover
• Malware Recovery
• Shodan Search Engine
MODULE 2: CYBER CRIMES • Types of Cyber Crimes
MODULE 5: WIFI SECURITY
MODULE 10: PRIVACY ESSENTIALS
• Theft & Damage
• Wi-Fi Networks
• Photo Metadata
• Hacktivists, Cyber Terrorists,
• Man in the Middle
• Geolocation
• VPN
• Seeking Privacy on the Internet
• Protecting Yourself When Using Wi-Fi
• Fictive Accounts & Credentials
• Protecting Your Wi-Fi Network
• Your Document’s Metadata
Cyber Criminals, Countries • National Level Examples MODULE 3: ACCOUNTS, CREDENTIALS AND IDENTITY THEFTS
MODULE 6: SOCIAL ENGINEERING
• Dictionary Attack and Brute Force
• Social Engineering Avoidance
• Password Security
• Spoofing
• Personal Accounts Breach
• Social Engineering
• Personal Accounts Recovery • Email Accounts • Identity Theft
ODIGIA.COM/CYBINT
• Deleted Data • Hiding your IP • Private Search Engines • Tor • Browsing Digital Traces
MODULE 7: SAFE BROWSING • HTTPS, Digital, Certificates and Encryption
© 2018 BARBRI, Inc. All rights reserved | 096-17