Cyber Security Guidelines based on ISO 27001 standards
Information Security Framework to stay Safe and Secure online - for Users in Office, Working-From-Home or Roaming Users
This Course starts with a brief discussion on recent Security incidents that have occurred globally, will give an idea how these attacks are unfolded and how exactly a User lands himself in various scenarios leading to Account /Data / Asset or Process compromise.
This Course is built on the skeleton of ISO/IEC -27001 Information Security Management System framework which constitutes of various process for Data Protection, Asset Management, Physical Access and Business Continuity Protocols.
This Course is designed for the Organizational Users (IT & Non-IT Employees) working from Office, Remotely working from Home & Employees working through various locations who may be constantly on move as a part of their duties. This course provides Security Guidelines to protect the Company Data, Accounts & Credentials and Physical Assets which they use to access Company Data and Resources.
Upon successful completion, the Users will be more aware of how to use Company resources like Email, Laptop, Company Data etc. and avoid falling prey to various Security Attack and compromises.
This course can be also treated as Human Resources Training that can be offered to New joiners during the Induction to make them aware of the Company security Policies and make them aware of the ISO 27001 ISMS Framework guidelines.
Your Instructor
Have been in the IT & Security Industry for close to 20 years now. On Checkpoint Firewall, I have achieved CCSA, CCSE & CCSE+ . Alongside got certified expertise on McAfee SIEM, IBM -QRadar SIEM & BlueCoat Security Analytics (Solera).
Product knowledge include multi OEMs Firewall, IPS, SSL Visibility, SIEM, SOC Operations, EDR, Security Analytics & Investigations.
Delivered multiple Security Deployments across clients spread to BFSI, Government, IT-ITES verticals.
Currently, I am trying to share some of my knowledge by means of Online Teaching
Course Curriculum
-
StartExtent of Damage for a Hack (2:01)
-
StartSupply Chain Attack (2:38)
-
StartScams and Frauds Exploiting Current Affairs (3:28)
-
StartPhone Call Frauds (2:13)
-
StartInsider Threats (2:16)
-
StartBitcoin Mining Hacks (1:47)
-
StartCompilation of Many Breaches (COMB) (2:29)
-
StartDark Web Brief (2:13)
Frequently Asked Questions
Just Check out what People have to say about the Course
This course is priced at a very Low price as I believe that EVERYONE has a right to be Safe and Secure when connected to Internet, and one does not have to shell out a fortune over that.
The Best Part of this course is that you don't have to be an IT User or possess any IT knowledge. This course is a set of effective security Practices which has helped Lot of my clients, Offices & their Employees to be safe while working.
Do let me know your comments on the course and put your valuable Reviews which can help me to improve.