Training agenda
- Social engineering
- Who is behind it and who benefits from it?
- What criminals need our data for?
- Why regular employees of organisation are most often the victims of the cyberattack?
- What is social engineering and where does its effectiveness and popularity come from ?
- Methods of Identifying social engineering attacks and methods of avoiding them
- Consequences of cybercriminals’actions for private persons and organisations
- How much do our data cost?
- E-mail security
- The rules of verifying appendices
- The rules of verifying links
- The rules of verifying addressees
- Does the sender have to be who he or she claims to be?
- Is it easy to impersonate company’s employee?
- Is it easy to extort huge amounts of money with only one e-mail?
- Security of Internet browsers
- What is phishing and how to avoid it?
- What is typosquating and domainsquating?
- What are the attacks such as clickjacking, camjacking, likejacking?
- The rules of verifying information and webstes, as well as URL-s
- Security of devices and data carriers
- Data carriers of the unknown origin as a threat
- Popular social engineering like „per courier”, „per pizza”
- Is USB lamp a data carrier ?
- New devices from IT department
- Secure data erasing
- Phone attacks
- Phishing
- Persuading to do specified actions via phone
- Is interlocutor who he or she claims to be?
- Threats related to mobile devices
- Mobile device security
- Granting authorisations to applications
- Smartphone – the best device of surveillance
- WIFI network threats
- Free of charge network
- How the name of network is connected with its security?
- Is it easy to develop false network which steals data?
- Password security
- Are our passwords shared publicly on the Internet?
- Which of our accounts have already been taken over by hackers?
- How long does cracking the password take?
- What is dictionary entry?
- How to create strong, secure and easy to remember a password?
- Artificial intelligence serving frauds
- False identities
- Using AI to generate the image
- Using AI to falsify the image
- Using AI to counterfeit the voice