Personal cybersecurity essentials: how to secure my technology environment

Personal cybersecurity essentials: how to secure my technology environment

Personal-cybersecurity-essentials
  • Date de début 25 April 2022
  • Durée 10 hours
  • Lieu Maison du Savoir
    2, avenue de l’Université
    L-4365 Esch-sur-Alzette
  • Langue Anglais
  • Prix HT 400.00 

Contexte de la formation

In a world where a large part of our daily activities revolve around intensive and extensive use of the internet, cybersecurity should be in everyone’s head. The obvious reason is that since we are consuming more and more in cyberspace, the economy has largely moved to the internet. So have criminals – which are now designated as cybercriminals – and you should be aware of how to be safe from them.

Join this course on cybersecurity and gain the necessary know-how to protect your activities, your privacy, and your money from cybercrime. 

Objectifs

In this course, you will learn the basics of personal cybersecurity and get the essential information on:

  • Who the cybercriminals are and what drives them
  • The techniques used by cybercriminals to attack their targets
  • The part of your activities that has (most) exposure to cybercriminals
  • The most sensitive and critical parts of your life – personal and professional – that need defending
  • Your risk profile and risk appetite
  • Your internet proficiency
  • The best protection strategy for you
  • The best practices and habits to acquire to make life harder for cybercriminals
  • The tools to consider
  • How to keep yourself informed

Programme de la formation

A TWO-DAY PROGRAMME WITH KNOW-HOW AND TECHNIQUES TO PROTECT YOU

The standard language of the course is English. However, on demand, the course can also be taught in French.

  • 25 April 2022 9.30 am – 12.00 am and 2.00 pm – 4.30 pm
  • 27 April 2022 9.30 am – 12.00 am and 2.00 pm – 4.30 pm

What do we know about cybercriminals?

  • Describe and explain the different types of cybercriminals
  • Individuals or organised crime or a new industry
  • The future

What are the techniques used by cybercriminals?

  • Phishing email types and tricks
  • Where is the malicious payload
  • Malicious websites
  • Malicious software
  • Malicious USB storage devices
  • Malicious online data shares
  • Stolen credentials/passwords
  • The next level – social engineering and business email compromise
  • Phone or SMS scams

Which are the most exposed activities?

  • Email
  • Social media
    • Use
    • Information
  • Data exchange
  • Browsing
  • PC use and sharing

What are the most sensitive parts of our personal and professional life?

  • What do we care about generally and individually?
  • How to define privacy
  • Our money
  • Our access to the internet

What is your risk profile and risk appetite?

  • Can we be risk free?
  • Which risk to take and which not
  • How to appreciate risk
  • How to learn about new risks

What is your internet proficiency level?

  • How to understand internet proficiency
  • How to judge
  • How to learn
  • How to be safe with little internet proficiency

What is the best protection strategy for you?

  • Managing your public profile
  • Managing your connected profiles
  • Personal, professional, job seeker point of view
  • Your GDPR rights
  • Is it possible to disconnect past and future
  • What to do if you have been compromised

What are the best practices and security habits to acquire?

  • PC Security basics
  • How to backup data
  • How to manage Wi-Fi properly
  • Dealing with phishing
  • Browser – IE, Chrome etc. – security
  • How to manage passwords properly
  • Who to trust
  • How to manage unknown websites
  • How enhance your privacy
  • How to use VPNs
  • How to manage your mobile devices
  • Mac privacy enhancements

Useful tools

  • How to keep the PC strong and safe
  • Which antivirus software to choose
  • VPNs
  • Encryption
  • Data shares
  • Back up

Key takeaways

Intervenants

Guy Marong :

  • Managing Partner at Cubic Consulting SARL
    Supporting major companies in Luxembourg, Europe, and South East Asia.
  • Advisor to a number of cybersecurity start ups
  • Global Chief Information Security Officer for Sony Electronics based in Singapore
  • European Chief Information Security Officer for Sony Europe
  • Various business positions in sales and marketing of Sony Electronics products based in Germany and Belgium
  • R&D engineer in the Semiconductor Business in Japan
  • Guy has an MBA from INSEAD, a Master’s degree from the University of California Berkeley, and an engineering degree from the University of Liège

Partager cette formation sur :