Computer application and computer literacy
UAB FastTrack LT
Registration
CYBERSECURITY: at work and in everyday life
0.0
No ratings
Learning begins:
2025-02-17
54 (ac. h.)
Price from:
500 €
About course
Information provided by the training provider
Abstract
Show more
Show less
This cybersecurity training program is designed for both individual users and employees and managers of companies.It raises awareness of security threats and provides practical skills on how to recognize and manage them.The program is divided into two parts: raising the security awareness of the user and the company, which provide a detailed overview of the most relevant cybersecurity threats and directions.The aim of the program is to strengthen the security culture and preparedness for cyber threats at all organizational levels.We implement this by reviewing the most important aspects of cybersecurity: the application of cryptographic principles in the framework of password security, two-factor authentication protocols, secure data transfer methods, including HTTPS and VPN technologies, e-mail.mail, SMS, calls, Soc.networks, GDPR regulatory background for data protection.
Important information
Way of learning
Remote synchronous
Place
-
Language
Lithuanian
Aukštos pridėtinės vertės programa
Yes
Minimum requirements for the participant
Education
Vidurinis išsilavinimas
Acquired and improved competencies
Ordinary:
Literacy competence
Digital competence
Professional competencies:
Understand and apply GDPR principles to organizational data protection
Apply secure cybersecurity principles online
Manage secure data transfer, including HTTPS and VPN technologies
Investigate typical suspected attacks
Recognize and manage cybersecurity risks
High value-added qualifications and competences:
Content of the learning program
Topic name | Brief description of the topic |
---|---|
Topic name
9.Company security awareness: Data protection under GDPR, Additional topics
|
Brief description of the topic
1.Data protection under the GDPR: 1.Understanding the conformity of the GDPR; Data protection under the GDPR; When does a company receive a fine for non-compliance with the GDPR?2.Additional topics: Recent cybersecurity trends; Continuous learning in the field of cybersecurity.
|
Topic name
3. User Wit: Social Media Security
|
Brief description of the topic
1.Social media security settings 2.Safe practices in social networks 3.Identifying and avoiding frauds
|
Topic name
5.User Awareness: Safe Browsing, Normal and Incognito Browsing, Virtual Private Network (VPN), DNS over HTTPS (DoH), Cookies
|
Brief description of the topic
1.Safe browsing: Who can see my browsing and how to avoid it?; Safe web browsing practices; Recognizing unsafe websites 2.Normal and incognito browsing: Differences and use cases; Privacy aspects.3.Virtual Private Network (VPN): What are TOR and Dark Web?; What is a VPN and why is it worth using; Selection and use of VPN services.4.DNS over HTTPS (DoH): Understanding DoH; Configuring DoH in browsers.5.Cookies: What are cookies and how they work; Managing cookies for privacy
|
Topic name
8.Company security awareness: Cyber and network security, Security architecture
|
Brief description of the topic
1.Cyber and network security: The basics of network security; Implementation of network security.2.Security architecture: Development of a secure IT architecture; Considerations of security architecture; Network segmentation; Flatnet; DMZ architecture.
|
Topic name
4.User Wit: Email, SMS, Calls, Data Protection and Office 365
|
Brief description of the topic
1.E-mail, SMS, Calls: Recognition of harmful letters, messages and calls; Safe Communication Practices 2.Data protection: Best practices for data management; Encrypted Emails: What is encryption?; Office365 email.encryption of mail; The importance and basics of encrypting emails; Encrypted emails.use of postal services; Data protection in the Office 365 ecosystem; Best practices for data management
|
Topic name
1.User awareness: Passwords, Password vaults, Two-factor authentication
|
Brief description of the topic
1.Passwords: Password hashes (HASHs); The importance of strong passwords; Password locking policy; Best practices for creating and managing passwords; Example: What happens if you have a weak password?2.Password repositories: Using password managers; Choose a trusted password store.3.Two-factor authentication: Types; What is two-factor authentication and why is it important; Determination of two-factor authentication; Two-factor authentication security vulnerabilities.
|
Topic name
6. User awareness: General network concept and IP addresses
|
Brief description of the topic
1.How does the Internet work?2.Network basics 3.Network settings and how it works
|
Topic name
7.Company security awareness: Vulnerability management, Asset management, Risk management
|
Brief description of the topic
1.Vulnerability management: What is vulnerability management?; Identifying and managing vulnerabilities; Tools and best practices.2.Wealth management: Tracking digital assets; Wealth management strategies; CMDB (Digital Wealth Database); Change management.3.Risk management: Identification and mitigation of risks; Risk assessment methods
|
Topic name
2. User Awareness: Fishing, Viscount and Stud Fishing
|
Brief description of the topic
1.How and why is Phishing performed?2.Fishing recognition 3.Prevention of Vishnu and Stud Fishing attacks
|
Topic name
10. Test to summarize the course
|
Brief description of the topic
1. Test 2. Assessment 3. Next steps in cybersecurity
|
Features of the program
Training is conducted remotely in synchronously through the MS Teams platform.Additional requirements
Computer literacyDuration of the learning programme
Duration of the learning programme: 54 (ac. h.)
Duration of practical contact work: 40 (ac. h.)
Duration of theoretical contact work: 14 (ac. h.)
Duration of self-employment: 0 (ac. h.)
Assessment
System / scale of assessment of acquired competencies: 1-10.
Important information
Way of learning
Remote synchronous
Place
-
Language
Lithuanian
Aukštos pridėtinės vertės programa
Yes
Minimum requirements for the participant
Education
Vidurinis išsilavinimas
Contacts
Name, Surname
Vilius Beniušis
Obligations
Klientų aptarnavimo konsultantas
Email
info@fasttrack.lt
Phone
+370 623 45 556
Timetables
K-CS1
Vacancies: 23
Training period:
2025-02-17 - 2025-04-02
Way | Place | Group size | Language | Lecturers | Price | Registration |
---|---|---|---|---|---|---|
Way
Remote synchronous
|
Address
-
|
Group size
17-23
|
Language
Lithuanian
|
Lecturers
-
|
Price
500 €
|
Registration
2024-10-22 - 2025-02-12
|
Ratings
There are no ratings at the moment.Scroll to the top