InfoSec Training for Corporations and Governments

Page 1

Cyber Security Solution — Training and Certification (CSPC) Over 95% of cyber attacks occur because of human error Technology alone is not enough to prevent major data breaches

cyber security experts and cyber industry professionals, including

and cyber attacks. Security is dependent on employee education

trainers and developers from the elite Israeli Cyber Units, and we

and training. Cybersecurity is one of the fastest growing industries

are aligned with the NICE framework.

and sensitive topics across nearly all professional sectors.

From governments to corporations, we are approved,

Whether you’re a national, state or local government entity,

and used by, the Department of Homeland Security,

private enterprise, academic institution, or military or para-military

Department of Justice, FBI, FINRA, and Bank of America.

organization, your assets and employees are inherently at risk 24/7.

Our solution is designed to train your team on cyber security

Understanding the cyber terminology, threats and

awareness (protection). While your organization may have robust

opportunities is now vital for all employees.

IT protections around your data systems, you can’t control the

That is where the Cybint–Odigia partnership comes in. Our partnership provides training, certifications and learning solutions across the cyber security and intelligence spectrum in an easyto-use platform. It’s capable of training an audience of any size

online practices of the people who access them. Cybint Security (Protection) is the leading cyber security program in the cyber education industry. Our program is the product of a collaboration between military-trained cyber security experts and education experts around the globe. When your employees receive a Cyber

and providing unmatched measurement and benchmarking

Security Protection Certification from Cybint delivered on the

capabilities to ensure trainees are completing training and

Odigia technology platform, you will know that they have acquired

fully comprehending it. We believe that protecting our assets,

unique knowledge and skills that are critical for you and your

companies and national security starts with tested and proven

clients. This will differentiate your organization from others in the

training. Our solutions are a collaboration between military-trained

market and provide distinct operational advantages.

ODIGIA.COM/CYBINT

© 2018 BARBRI, Inc. All rights reserved | 096-17


About the CSPC Solution:

TRAINING

ASSESSMENT

CERTIFICATE

TOOLS

At its core, the Cyber Security (Protection) solution consists of training, assessment, certification and tools that will teach your employees how to improve their online security practices. The program addresses cyber security at the employee level — creating a deep and powerful network of cyber security expertise beyond the typical technical expertise. Your team will have access to these materials for 12 months following purchase. Your purchase includes updates and new materials that will be automatically uploaded to the system. The Cybint Security program features more than 60 learning units, each less than 10 minutes long. The package focuses on various aspects of cyber security, and contains exclusive live webinars on emerging cyber topics. The Cyber Security (Protection) program focuses on behaviors that may put your company at risk. Upon completion of training, there is a certification exam to verify learning and identify areas that require more study.

A set of 10 assessments allows you to identify your employees’ gaps in cyber security, measure ongoing improvement and identify areas that require more study. The final exam will grant your employees the exclusive Cyber Security (Protection) certification.

ODIGIA.COM/CYBINT

© 2018 BARBRI, Inc. All rights reserved | 096-17


HOW IT WORKS: Throughout the Cyber Security (Protection) program, each module is concluded with a set of comprehensive review questions to effectively assess a learners’ comprehension and recall of the material presented. Each question includes feedback to a learner’s response to reinforce their learning and contribute to their knowledge retention. This solution is designed to track the advancement of each learner, allowing you to view their progress at any point through the program dashboard. In addition, designated administrators may also track user progress, including quiz scores and module completion. This function is ideal for organizations that wish to administer training internally. CERTIFICATION (CSPC): LEARNING METHODOLOGY:

Following the completion of the training, the learner can take the

The program is based on the micro-learning concept, with short

final exam, and earn a Cyber Security (Protection) Certification.

learning units (5-10 minutes each). The self-paced, interactive

Once the learners have passed the final exam, they will receive an

program first provides the theoretical background and knowledge,

e-certification with the title: Cyber Security Protection Certified

then demonstrates how they are used, and finally allows your

(CSPC). These initials will not only showcase their competence

team to practice their newly gained skills.

in cyber security, but will distinguish your business from others

The 10 modules of the Cyber Security (Protection) program cover all aspects of cyber security. The learners don’t have to follow the specific order of the program, although we recommend they do

in the industry. In addition to the training and certification, your employees will also have access to our advanced toolkit that allows them to implement in real life what they have learned.

so for a better learning experience.

ODIGIA.COM/CYBINT

© 2018 BARBRI, Inc. All rights reserved | 096-17


TRAINING OVERVIEW: CYBER SECURITY

MODULE 1: INTRODUCTION TO CYBER SECURITY PROTECTION

MODULE 4: SECURITY – WARES, VIRUSES, ATTACKS

• Web Exploits • Cookies

• Introduction to Cyber Security

• Viruses VS Malwares

• Web Browsers

• The Internet

• Ransomware

• Advanced Tools

• IP, MAC and DNS

• Spyware & Trojan Horse

• The Weakest Link

• Adware

• The Reach-Breach Concept

• Denial of Service

• The Cyberspace

• Software Exploit

• Cloud - How it Works and

• Antiviruses, Anti-Malwares & Firewalls

MODULE 8: MOBILE SECURITY • The Mobile Paradox • Steps to Protect Your Mobile Phone MODULE 9: HARDWARE EXPLOITS

Cloud Security

• Prevention

• USB Drives

• Routers and WiFi

• Detection

• Remote Takeover

• Malware Recovery

• Shodan Search Engine

MODULE 2: CYBER CRIMES • Types of Cyber Crimes

MODULE 5: WIFI SECURITY

MODULE 10: PRIVACY ESSENTIALS

• Theft & Damage

• Wi-Fi Networks

• Photo Metadata

• Hacktivists, Cyber Terrorists,

• Man in the Middle

• Geolocation

• VPN

• Seeking Privacy on the Internet

• Protecting Yourself When Using Wi-Fi

• Fictive Accounts & Credentials

• Protecting Your Wi-Fi Network

• Your Document’s Metadata

Cyber Criminals, Countries • National Level Examples MODULE 3: ACCOUNTS, CREDENTIALS AND IDENTITY THEFTS

MODULE 6: SOCIAL ENGINEERING

• Dictionary Attack and Brute Force

• Social Engineering Avoidance

• Password Security

• Spoofing

• Personal Accounts Breach

• Social Engineering

• Personal Accounts Recovery • Email Accounts • Identity Theft

ODIGIA.COM/CYBINT

• Deleted Data • Hiding your IP • Private Search Engines • Tor • Browsing Digital Traces

MODULE 7: SAFE BROWSING • HTTPS, Digital, Certificates and Encryption

© 2018 BARBRI, Inc. All rights reserved | 096-17


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.