Cyber-Security Awareness and Risk-Mitigation Essentials (CARE)


 

                  Course Description

                  This course can be done by individuals from anywhere connected with internet. It is based on total 6 modules covering the cyber security parameters from different aspects. Every module has been allocated particular time to be completed. 

                  Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the individuals, matching and poll questions, open/closed questions, and interactive discussions. This interactive learning technique is based on sound adult learning theories and  the questionnaire might be a mixture of closed and open ended questions but easy to understandable and answerable.

                  Course Modules

                  Module 1 Cyber Crime:

                  The objective of this module is to give an overview about the Cyber-crimes in order to use secure and safe online environment. The module is encompassed of “cyber-crime definition, types of cyber-crime, categorization of cyber-crimes in Pakistan, cyber-crimes statistics, cyber-crimes event catalogue (Pakistan) and a case study based on real incident”.

                  Module 2 Cyber Bullying:

                  The objective of this module is to give an overview about the cyber-bullying, its dangerous symptoms, statistics, consequences, risk factors, mitigation techniques, and guidelines in order to use secure and safe online environment. The module is encompassed of “essential terminologies, cyber-bullying definition, and its types, common channels of cyber bullying, cyber-bullying statistics and usage, cyber-bullying case studies, news items, solution and guidelines and a case study based on real incident.”

                  Module 3 Cyber Profiling:

                  The objective of this module is to give an overview to the students and youth about the cyber-profiling, its dangerous symptoms, statistics, consequences, risk factors, mitigation techniques, and guidelines in order to use secure and safe online environment. The module is encompassed of “cyber-profiling definition, what employers can see and monitor, what parents can see and monitor, what people can see and monitor, what government can see and monitor, what terrorists can see, monitor, and exploit, what criminals can see, monitor and exploit and a case study based on real incident”. 

                  Module 4 Cyber Privacy:

                  The objective of this module is to give an overview about the cyber-privacy, some statistics, consequences, risk factors, mitigation techniques, and guidelines in order to use secure and safe online environment. The module is encompassed with “cyber/online privacy definition”, “cyber/social media privacy statistics”, “Facebook privacy hierarchy”, “who can be informed when you visit a website”, “cyber/online privacy issues, risks, and detailed guidelines” and case study based on real incident.

                  Module 5 Cyber Security Overview of Mobile Devices:

                  The objective of this module is to give an overview about the cyber-privacy, some statistics, consequences, risk factors, mitigation techniques, and guidelines in order to use secure and safe online environment. The module is encompassed with “cyber security for smartphone definition”, “internet use on smartphones and associated risk”, “top 10 most dangerous things people do with smartphones”, “careless behavior of mobile users”, “how smartphones hack your life”, “internet dangers and smartphones”, “smartphone theft level”, “growing threat of smartphones-mobile malware”, “mobile apps and their impacts”, and a case study based on real incident”.

                  Module 6 Cyber Security Guidelines for Mobile Devices:

                  The objective of this module is to give an overview about some important and recommended guidelines and mitigation techniques for using mobile devices in order to use secure and safe online environment. The module is encompassed with contents like “protect your mobile device (Do’s and Don’ts”, “basic security configurations of android”, “basic security configurations of IOS”, “smart guidelines for smart security of mobile devices”, “what to do if your mobile phone or PDA is stolen”, “ quiz based questionnaire to ensure best cyber security practices”.

                  Instructor Profile

                  Khurram Javed  

                  (CEI, CEH, CHFI, ECSA, LPT, CCAI)

                  Who Should Attend

                  1. End-Users
                  2. Technical Personnel's
                  3. Management Personnel's
                  4. HR/Finance/Admin Personnel's
                  5. Parents
                  6. Students