Cybersecurity Awareness for the workforce

  • Duration: 3 Hours

  • Level : Basic

  • Location: MCCI Business School

  • Price : Rs 5,000


About this course

More than ever, individuals and organizations need to protect themselves against online threats. The objective of this course is to raise awareness among employers and employees about emerging IT threats and attacks. Nowadays, uninformed employees can be easily victims to different types of threats. Today’s threats go much beyond the scope of conventional forms of attacks such as viruses and trojans but extend to other sophisticated forms of malware which encompass spear phishing attacks, business email compromise, social engineering attacks, identity thefts, cryptojacking and ransomware attacks. Awareness is key to prevention of different types of attacks and protection of corporate data and Intellectual Property. In 2023, security awareness poses a fundamental layer of security in addition to other layers of security already implemented by organizations.


The objective of this course is to raise awareness among employees on how to protect the enterprise against cyberattacks.

Course Content

Part 1: The new cybersecurity landscape
  • Understand how the cybersecurity landscape is evolving
  • The latest cyber-attacks trends from industry reports
  • Cybercrime statistics
  • Components of a cyber risk
Part 2: Malware types
  • Understand the different types of malicious software
  • The latest ransomware attacks
  • Preferred vectors of cyber attacks
Part 3: Email phishing attacks
  • Social engineering techniques
  • Email as a preferred vector of attack
  • Types of phishing attacks – Email phishing, Spear phishing, Whaling, Smishing, Vishing
  • Techniques to identify sophisticated phishing emails
  • Business email compromise
Part 4: Passwords
  • Understanding password complexity vs password length
  • Passphrase vs Passwords
  • Creating secure authentication and know when your password is compromised
Part 5: 10 ways to protect your organization and its data
  • Multi factor authentication – Creating secure authentication using 2FA, 2SV or MFA
  • Software patching
  • Identifying sophisticated attacks using fake URLS
  • Detect potentially infected attachments
  • Securing your data over public networks
  • Securing mobile devices
  • Protecting online privacy
  • Learn how encryption can protect your data
  • Protect your online privacy
  • Protect from ransomware and other sophisticated attacks