Program Structure
Book Now

Course overview

This comprehensive module includes solid foundational components for an organization’s overall information security awareness program. It improves the understanding of key people in the organization about information security risks, sound information protection practices, and how their individual actions and behaviors can impact information security in their organization.

This exceptional course uses a stimulating and creative approach that engages and challenges the learner. Interactive learning activities and realistic scenarios are presented that maintain interest and add relevance for learners from different departments and key responsibilities within the organization.

**We also offer tailored cyber security training programs specifically for an IT or management team. Please enquire for separate program structures.

Course Duration: 2 Days

Course Content

    • Introduction to Information Security
      • Essential Terms
        • Threat
        • Risk
        • Asset
        • Vulnerability
        • Zero Day – Vulnerability / Attack
      • What is Information Security
      • Business Need for Information Security
      • CIA Triad
      • Case Studies of Recent Hacks


    • Phases of Hacking
      • Reconnaissance
        • Passive Reconnaissance – AV Media / Social Media / Print
        • Active Reconnaissance
      • Social Engineering & Techniques
        • What is Social Engineering
        • Social Engineering Techniques
          • Phishing
          • SMShing
          • Whaling
          • Dumpster Diving
          • Shoulder Surfing
          • Tailgating / Piggy-backing
          • Disgruntled Employees
          • Identity Theft
          • Unauthorised Access
          • Shadow IT
        • Credential harvesting / Password guessing
        • Preventive measures


    • Malwares, Ransomware & Key-loggers
      • What are malwares
      • Types of malwares
        • Virus
        • Worms
        • Trojans
        • Rootkits
        • Adware
        • Spyware
        • Crimeware
      • What are ransomwares
      • What are key loggers
      • Fly-by-downloaders
      • Droppers
      • Advance Persistent Threats
      • Preventive Measures
        • Patch management
        • AV updates
        • Back-up


    • Security Best Practices
      • Password guidelines
      • Internet usage
      • Email usage
      • Email etiquettes
      • Identifying phishing emails
      • Dealing with offensive emails
      • 2-Factor / Multi-factor authentication
      • Mobile device security threats & prevention
      • Portable device / media security threats & prevention
      • Clear desk
      • Handling / Disposal of sensitive data (print/digital)
        • Data classification & labelling
        • Storage – encryption / hashing
        • Disposal
      • Physical Security
        • Access controls
        • Visitor management

Q: When are the courses held?
A: The courses are scheduled monthly throughout the year.

Q: What do I take away from the course?
A: As well as the skills to use the product, you also receive a comprehensive workbook and a certificate of attendance.

Q: Do I get a course manual to keep?
A: Yes, you receive a comprehensive workbook.

Q: Where are the classroom training courses held?
A: The courses are all held in Parramatta, Sydney.

Q: Is the training practical or theory based?
A: Both. All of our course combine practical demonstrations and theory. You will have a sole use of a laptop throughout the course and can practice what you have learnt at the end of each chapter.

Q: Do I need to bring a laptop?
A: Yes, it is required to help you start from scratch on your own machine.

Q: Is there an exam?
A: You do not sit an exam at the end of the course.

Q: What qualification will I get?
A: You will receive a certificate of attendance.

Q: Do I need any previous practical experience?
A: This depends on the course you choose to take. All of our Introductory and Complete courses require no prior knowledge. If you are considering attending an Advanced course, but have not sat the basic course, then you will be expected to have relevant practical experience in the tool.

Q: Do you offer on-site training?
A: Yes, all of our courses can be delivered as on-site courses. We provide all laptops, projector, workbooks and certificates. We can also deliver on-line training just for your company with a schedule to suit you.

Q: Do you offer post course support?
A: Yes, in two ways; firstly, all our trainers can help with initial queries you may have when using the tools post-course via email. Secondly we also provide short-term on-site internship.