Sunteți pe pagina 1din 180

Period 1

9 AM to 10 AM
Day Subject Topic

1 Introduction Information security

Overview of Information Vendor Versions of Information


2
Security Security Policies

Module coverage
3 English
Why learning English is important
4 Computers History of Computers

Overview of Information Special challenges for the CIA


5
Security triad:

Overview of Information
6 Costs of information
Security

Module coverage
7 English
Why learning English is important
8 Computers History of Computers

Overview of Security
9 Conventional vs. New Threats
threats

Overview of Security Overview of Information Security


10
threats Threats

Overview of Security
11 Inadequate Security Technology
threats
Overview of Security
12 Malware Prevention and Removal
threats

Module coverage
13 English
Why learning English is important

14 Computers History of Computers

Overview of Security
15 Breaking down 'Modus Operandi'
threats
Overview of Security
16 Get the Analyst Report
threats

Overview of Security Phishing Threats (Premium or


17
threats Enterprise)

Information Security Why do Information Security


18
Vulnerabilities Vulnerabilities exists

Communication Skills
19 Soft Skills - Verbal communication
Module coverage
20 English
Why learning English is important

21 Computers History of Computers

Information Security Weaknesses in System and Network


22
Vulnerabilities Configurations

Information Security
23 Weakness Description
Vulnerabilities
Information Security Best practices for minimizing security
24
Vulnerabilities and privacy risk

Information Security Disadvantages of Cloud


25
Vulnerabilities Computing:

Information Security Tips for Secure Browsing with


26
Vulnerabilities Mozilla Firefox

Information Security Is tor the most secure


27
Vulnerabilities browser?
28 Risk Management What is Risk?

29 Risk Management Price of Risk

BREAKING DOWN 'Asset


30 Risk Management
Valuation'

Examples of Some Vulnerabilities


31 Risk Management
that Are Not Always Obvious
Module coverage
32 English
Why learning English is important

33 Computers History of Computers

Why Is Risk Assessment


34 Risk Management
Difficult? /

Communication Skills
35 Soft Skills - Verbal communication
Evaluate the risks and decide on
36 Risk Management
control measures

How often do risk


37 Risk Management assessments need to be
reviewed?

Communication Skills
38 Soft Skills - Verbal communication

39 Legal Framework Intellectual Property Laws


40 Legal Framework Cybercrimes Authorities

41 Computers History of Computers

Digital Signature Vs. Digital


42 Legal Framework
Certificate

2. Protect Your Personal


43 Legal Framework
Information
44 Legal Framework Police Officers

45 Legal Framework Role of Evidence in a Trial

Communication Skills
46 Soft Skills - Verbal communication

What is the process of


47 Legal Framework
investigating a crime?
48 Computers History of Computers

What's the Difference Between


49 Privacy Protection
Privacy and Security?

50 Privacy Protection Privacy Impact Assessments

What is a Privacy Impact


51 Privacy Protection
Assessment GDPR?
What does default privacy
52 Privacy Protection
mean?

Communication Skills
53 Soft Skills - Verbal communication

What is the deadline for


54 Privacy Protection
GDPR?

55 Computers History of Computers


56 Privacy Protection What is Pia security?

What are the CIA


57 Privacy Protection
principles?

Information Security Understanding Security


58
Policy and Procedures Frameworks

Information Security What is international security


59
Policy and Procedures standards?
Information Security
60
Policy and Procedures What is a security procedure?

61 Computers History of Computers

Information Security Information Security Policy


62
Policy and Procedures Sections

Information Security Implement information security


63
Policy and Procedures policies and procedures
Communication Skills
64 Soft Skills - Verbal communication

Best practices and Guidelines in


Information Security
65 developing information security
Policy and Procedures
policies and procedure

Information Security
66 Finance & Accounting module:
Policy and Procedures

Information Security What do you mean by


67
Policy and Procedures Internet chatting?
68 Computers History of Computers

69

70

71
72

73

74

75
76

77

78
Period 2
M 10 AM to 11 AM
Inst code Subject Topic

Overview of Information What is meant by Strategic


Security Alignment?

Overview of Information Client Synopsis of Information


Security Security Policies

Overview of Information
Technical Control
Security
Overview of Information
Third Parties
Security

Overview of Information
Dimensions of Information Security
Security

Overview of Information
Data Management
Security

Overview of Information Differences between Internet and


Security Intranet
Overview of Information
Why Care About Security?
Security

Overview of Security
· Conventional Threats
threats

Overview of Security Top 10 Threats to Information


threats Security

Overview of Security Types of threats – DDoS, Malicious


threats codes, Espionage, et
Overview of Security
Probing of threats/
threats

Overview of Security
SAINT
threats

Overview of Security Splatter vision: Seeing the forest and


threats the trees

Overview of Security
Modus Operandi Examples
threats
Overview of Security
Detection
threats

Overview of Security Domain Threats (Premium or


threats Enterprise)

Information Security Who should be aware of security


Vulnerabilities vulnerabilities and why?

5 Information Security
Internal Network Security
Vulnerabilities
Information Security
SQL Injection
Vulnerabilities

Information Security
Unauthenticated protocols
Vulnerabilities

Information Security Any discussion on network security will


Vulnerabilities include these three common terms

Information Security Configuration of TCP ports and


Vulnerabilities Internet services
Information Security
Vulnerability to Attack
Vulnerabilities

Information Security
Weaknesses in Online e-transactions
Vulnerabilities

Information Security
Configure privacy settings
Vulnerabilities

Information Security
Vulnerabilities Is Chrome safer than edge?
Risk: The Good, the Bad, and the
Risk Management
Necessary

Relationship between Threat,


Risk Management
Vulnerability, and Risk

Risk Management Net Asset Value

There are four (4) main types of


Risk Management
vulnerability:
Risk Management What Is Impact?

Typical work products would


Risk Management
include:

Risk Management Just keep things simple

5 Guidelines and Examples of Good


Risk Management
Practice
Risk Management Record your findings

Are risk assessments a legal


Risk Management
requirement?

5 Legal Framework Main Types of Law

Legal Framework Software Licensing


Legal Framework Who to Contact

Legal Framework Prosecution

Digital Signature Vs. Electronic


Legal Framework
Signature

3. Install or Update Your Antivirus


Legal Framework
Software
Legal Framework Legal Issues Create Similarities

Legal Framework general types of evidence

5 Legal Framework Chain of Custody

What are the 4 steps in


Legal Framework
processing DNA?
Why Would You Want to Use
Privacy Protection
Domain Privacy Protection?

Privacy Protection What is Privacy?

Loss of “Private Spaces” inhibits


growth, experimentation, research
Privacy Protection
and technological/cultural
advancement

What is privacy impact


Privacy Protection
assessment definition?
What is full lifecycle
Privacy Protection
protection?

5 Privacy Protection Who enforces GDPR?

Privacy Protection What is sensitive personal data?

What do you mean by ethical


Privacy Protection
implications?
What is a privacy threshold
Privacy Protection
assessment?

What are the characteristics


Privacy Protection
of CIA triangle?

Information Security What are cyber security


Policy and Procedures standards?

Information Security Information Security Management


Policy and Procedures Elements
Information Security
Significance
Policy and Procedures

Information Security What are compliance


Policy and Procedures documents?

Information Security
Policy Introduction
Policy and Procedures

Information Security How do you implement policies


Policy and Procedures and procedures?
5 Information Security
Consider this scenario
Policy and Procedures

Information Security
Internet Marketing
Policy and Procedures

Information Security
Types of advanced modules.
Policy and Procedures

Information Security What is internet marketing all


Policy and Procedures about?
Information Security
Policy and Procedures What is used for online chat?
Period 3
M 11 AM to 12 PM
Inst code Subject Topic

The two approaches to


Overview of Information
information security are
Security
parallel and integrated.

Overview of Information Building a Foundation for


Security Cyber Resilience

Communication Skills
Soft Skills - Verbal communication
When is the right time to
Overview of Information
address Information
Security
Security?

Computers History of Computers

Overview of Information
Intranet/Internet
Security

Information Security and


Overview of Information
Cyber Security
Security
relationship
Overview of Information Why You Should Care
Security About IoT Security

Computers History of Computers

Overview of Security Technology with Weak


threats Security

Overview of Security
What is Malware?
threats
Overview of Security
Probing the Network
threats

Overview of Security
Nessus
threats

Scanning strategies for


Overview of Security
specific zones of the
threats
periphery

Computers History of Computers


Overview of Security
Monitoring
threats

Overview of Security Mobile Threats (Premium


threats or Enterprise)

Information Security
Security vulnerability type
Vulnerabilities

Information Security How to Prevent Computer


Vulnerabilities Security Vulnerabilities
Information Security
OS Command Injection
Vulnerabilities

Information Security
Outdated hardware
Vulnerabilities

Computers History of Computers

Misconfiguration of
Information Security
security and network
Vulnerabilities
devices
Information Security Best practices to help you
Vulnerabilities reduce cloud attacks

Information Security
Malware
Vulnerabilities

Computers History of Computers

Information Security Is edge a secure


Vulnerabilities browser?
How Do Investors
Risk Management
Measure Risk?

Risk Management What is a Threat?

Absolute Valuation
Risk Management
Methods

Risk Management What Is a Control?


Risk Management Control Effectiveness

Options for handling risks


Risk Management typically include
alternatives

Risk Management Types of Risk Assessment

Let's Get Real (Limiting


Risk Management
Risk and Stop Losses)
Review your assessment
Risk Management and update as and when
necessary

What are the 5


Risk Management stages of risk
assessment?

Legal Framework Categories of Law

Computers History of Computers


Enforcement and
Legal Framework
Penalties

Security measures and


Legal Framework
Privacy protection

The Indian Evidence Act


Legal Framework
and Digital Signature

4. Secure Configuration
Legal Framework
of the System
Legal Framework Making a Choice

Computers History of Computers

How Is Evidence
Legal Framework
Processed?

What is the process


Legal Framework
of DNA test?
Benefits of Using Domain
Privacy Protection
Privacy Protection

Assess privacy
Privacy Protection implications of security
technologies

Loss of mass privacy, and


exempting “the rich” from
it, helps to perpetuate
status-quo laws /
Privacy Protection standards /
establishments, and
encourages parasitism,
corruption, and crony
capitalis

What is impact
Privacy Protection assessment and why is
it important?
Privacy Protection What is Pia short for?

What is the purpose of


Privacy Protection a privacy impact
assessment?

What is GDPR
Privacy Protection
personal data?

Computers History of Computers


Privacy Protection What is Pia short for?

What is the
Privacy Protection importance of the
CIA?

Information Security
Security Framework
Policy and Procedures

Information Security
ISO 17799
Policy and Procedures
Information Security
Security Practices
Policy and Procedures

Information Security What is a non


Policy and Procedures compliance form?

Computers History of Computers

What is an
Information Security
Policy and Procedures organizational security
policy?
Ways to Improve
Information Security
Collaboration Between
Policy and Procedures
Departments

Information Security Specialized Areas of


Policy and Procedures Internet Marketing

Computers History of Computers

What is Internet
Information Security
Policy and Procedures marketing in simple
English?
Information Security How many types of
Policy and Procedures chat are there?
Activity Cum Lesson Planner - Accounts Assistant Using T
3 Period 4
12 PM 12 PM to 1 PM
Inst code Subject Topic

Module coverage
English Why learning English is
important

Recall alphabets
English Recall vowels and
consonants

Family Relationships
- Some common
5 English occupations
- Names of fruits and
vegetables, Animals
English Student Activity

English Student Activity

English Grammar, Parts of speech

English Grammar, Parts of speech


English Grammar, Parts of speech

English Grammar, Parts of speech

English Grammar, Parts of speech

English Grammar, Parts of speech


English Grammar, Parts of speech

English Grammar, Parts of speech

English Student Activity

English Student Activity


English Student Activity

English Common mistakes

English Common mistakes

English Common mistakes


English Idioms and phrases

English Idioms and phrases

English Idioms and phrases

English Idioms and phrases


English Grammar, Parts of speech

English Grammar, Parts of speech

English Grammar, Parts of speech

English Grammar, Parts of speech


English Grammar, Parts of speech

English Grammar, Parts of speech

English Grammar, Parts of speech

English Tense and its Types


English Tense and its Types

English Tense and its Types

English Tense and its Types

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important

Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important

OJT Hou
son Planner - Accounts Assistant Using Tally (ICT701)
d4 Period 5
1 PM 1.30 PM to 2.30 PM
Inst code Subject Topic

Overview of Information
parallel approach
Security

Importance of Soft Skills


Soft Skills - Meaning of Soft Skills
- How to improve soft skill

Overview of Information Who is responsible for


Security Information Security?
Overview of Information
Basics of IS (CIA)
Security

Overview of Information
Value of information
Security

Overview of Information
What is the Internet?
Security

Overview of Information Cyber Security Vs


Security Information Security
Overview of Information Device Manufacturers Are
Security Making It Easy for Hackers

Overview of Security
Former employees
threats

Overview of Security Neglecting Proper


threats Configuration

Communication Skills
Soft Skills - Verbal communication
Overview of Security
Net Cop
threats

Overview of Security
Net Stat Live
threats

Overview of Security
Start scanning inside
threats

Overview of Security
External threats
threats
Overview of Security
Enforcement
threats

Communication Skills
Soft Skills - Verbal communication

Information Security Types of Technical


Vulnerabilities Vulnerabilities/

Information Security Types of Native


Vulnerabilities Vulnerabilities
Information Security
Buffer Overflow
Vulnerabilities

Communication Skills
Soft Skills - Verbal communication

Information Security Security Policy


Vulnerabilities Weaknesses

Information Security Weaknesses in Web or


Vulnerabilities Cloud applications
Information Security Limited control and
Vulnerabilities flexibility

Information Security
Increased Security Risks
Vulnerabilities

Security holes in Browser,


Information Security
Web Applications, OS, and
Vulnerabilities Smartphone’s

Information Security Is Edge the fastest


Vulnerabilities browser?
Communication Skills
Soft Skills - Verbal communication

Risk Management What is a Vulnerability?

Relative Valuation &


Risk Management
Comparable Transactions

What Is Risk Likelihood


Risk Management
and consequences?
Communication Skills
Soft Skills - Verbal communication

Risk Management Risk Assessment (Phases)

two types of risk


Risk Management
assessments

Best Practices and


Risk Management Guidelines in Mitigating
Risks
Risk Management Qualitative

How long should a


Risk Management risk assessment be
kept?

Foundational Concepts of
Legal Framework
Law

Historic Examples of
Legal Framework
Computer Crimes
Legal Framework Warning Letters

Legal Framework Physical Security

Communication Skills
Soft Skills - Verbal communication

5. Choose a Strong
Legal Framework
Password and Protect It
Investigation of Any
Legal Framework
Crime

General Rules for


Legal Framework
Evidence

Legal Framework Evidence Types

What are the terms


Legal Framework
of internet?
Communication Skills
Soft Skills - Verbal communication

Privacy impact
Privacy Protection
assessment

Advancing technology
Privacy Protection can manipulate the public
based on their private data

What does privacy by


Privacy Protection
design mean?
Are privacy policies
Privacy Protection
required?

What is the GDPR


Privacy Protection
regulation?

Communication Skills
Soft Skills - Verbal communication

What is a privacy
Privacy Protection
threshold assessment?
Why is information
Privacy Protection
security important?

What does the CIA


Privacy Protection
actually do?

Communication Skills
Soft Skills - Verbal communication

Information Security
Security Policy
Policy and Procedures
Information Security
Security Compliances
Policy and Procedures

Security Compliance
Information Security
Grows Even More
Policy and Procedures
Challenging

Information Security
Compliance
Policy and Procedures

Information Security How do you


Policy and Procedures implement a policy?
Enforcing and
Information Security maintaining strategies for
Policy and Procedures effective implementation
of security practices

What is Internet
Information Security
Marketing? What is
Policy and Procedures
chatting?

Information Security
Scheduled triggers
Policy and Procedures

Information Security What is chatting and


Policy and Procedures its types?
Information Security What is Internet
Policy and Procedures marketing strategy?

OJT Hours
d5 Period 6
2.30 PM 2.30 PM to 3.30 PM
Inst code Subject Topic

Definition of a computer
Computers Basic Operations of a
computer

5 Computers History of Computers

Block diagram of a
Computers
computer Hardware
Basic Terms
Computers
Operating system

Input/Output devices
Computers
Central Processing Unit

Specifications of a
Computers
computer

Application softwares
Computers
Student activity
Computers Student Activity

Windows Nomenclature
Computers
Creating Files and Folders

Windows Nomenclature
Computers
Creating Files and Folders

5 Installing simple
Computers
softwares
Installing simple
Computers
softwares

Windows Nomenclature
Computers
Creating Files and Folders

Windows Nomenclature
Computers
Creating Files and Folders

Windows Nomenclature
Computers
Creating Files and Folders
Windows Nomenclature
Computers
Creating Files and Folders

MS Word
- Use of MS word
5 - Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
5 - Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

Basic Terms
Computers
Operating system
MS Word
- Use of MS word
5 - Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document

Word and Excel


Computers
Formatting
5 Word and Excel
Computers
Formatting

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting
Word and Excel
Computers
Formatting

Basic Terms
Computers
Operating system

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting
Word and Excel
Computers
Formatting

Word and Excel


Computers
Formatting

5 Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting
Word and Excel
Computers
Formatting

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting

Basic Terms
Computers
Operating system
5 Word and Excel
Computers
Formatting

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting
Word and Excel
Computers
Formatting

Word and Excel


Computers
Formatting

5 Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting
Word and Excel
Computers
Formatting

Word and Excel


Computers
Formatting

5 Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting
Word and Excel
Computers
Formatting

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting
Word and Excel
Computers
Formatting

Word and Excel


Computers
Formatting

Word and Excel


Computers
Formatting

Basic Terms
Computers
Operating system
Basic Terms
Computers
Operating system
d6 Period 7
3.30 PM 3.30 PM to 4.30 PM
Inst code Subject Topic

Information Security
Overview of Information
Policy Regulatory
Security
Requirements

Overview of Information What is Information


Security Security?

Overview of Information
Top-down Approach
Security
Overview of Information
Integrity:
Security

Overview of Information
Business Dimension
Security

Overview of Information
What is an Intranet?
Security

Definition of Information
Overview of Information
Security and Cyber
Security
security
Overview of Information It’s Already Happening,
Security and Has for a While

Overview of Security Domestic intelligence


threats services

Overview of Security
Outdated Security Software
threats

Overview of Security
Ransom ware
threats
Overview of Security
Net Brute
threats

Overview of Security
Scanning of threats
threats

Overview of Security
Modus Operandi
threats

Overview of Security What are External


threats Threats?
Dive Deeper into the
Overview of Security
External Threats Solution
threats
Set

Overview of Security Social Executive Threats


threats (Enterprise)

Information Security Exposure Leads to


Vulnerabilities Threats

Software vulnerabilities are


Information Security
explained by three ideal
Vulnerabilities factors.
Information Security Flaws in Software or
Vulnerabilities Protocol Designs

Information Security Vulnerable Windows


Vulnerabilities operating systems

Information Security Weakness what can go


Vulnerabilities wrong?

Information Security Disadvantages of Cloud


Vulnerabilities Computing Explained
Information Security
Vendor Lock-In
Vulnerabilities

Information Security Browser Security and Role


Vulnerabilities of cookies and pop-ups

Information Security
Bad data storage practices
Vulnerabilities

Information Security Is Microsoft edge


Vulnerabilities safe?
Risk: The Passive and the
Risk Management
Active

Risk Management What is an Exploit?

What Is a Threat
Risk Management
Source/Agent?

· How to Place Risks in


Risk Management
the Matrix
Qualitative risk
Risk Management
assessment

Why do a risk
Risk Management
assessment?

Different Approaches to
Risk Management
Risk Analysis

Risk mitigation handling


Risk Management
options
Risk Management Quantitative

When should Riddor


Risk Management
be reported?

Legal Framework Common Laws – Civil

Who Perpetrates These


Legal Framework
Crimes?
Legal Framework Infringement notices

Digital Signature legal


Legal Framework
ecosystem

Computer Crime and Its


Legal Framework
Barriers

Security Principles for


Legal Framework
International Use
Legal Framework Criminal investigation

Legal Framework Evidence Requirements

Legal Framework Hearsay Rule Exception

What are financial


Legal Framework
terms?
Avoid the Hassle of
Privacy Protection
Domain Privacy Services

PIA is designed to
Privacy Protection
accomplish three goals

Privacy Protection Purpose

What is a Privacy
Impact Assessment
Privacy Protection PIA is an analysis of
how information is
handled?
What is privacy
Privacy Protection
enhancing software?

Why is GDPR
Privacy Protection
important?

What is the processing


Privacy Protection
of personal data?

What is a Privacy
Privacy Protection Impact Assessment
GDPR?
What are the three
Privacy Protection principles of the CIA
triad?

Can CIA agents


Privacy Protection
carry guns?

Information Security What are cyber


Policy and Procedures security standards?

Information Security What is information


Policy and Procedures security policy?
Information Security What is cyber security
Policy and Procedures compliance?

Streamlining Security
Information Security Compliance Initiatives
Policy and Procedures with Compliance
Management

Information Security Consider Information


Policy and Procedures Security Vulnerabilities

Information Security What is policy


Policy and Procedures implementation?
Update and upgrade Key
Information Security Performance Indicators
Policy and Procedures for security
implementation

Information Security  Types of basic


Policy and Procedures modules.

Information Security
Instant triggers
Policy and Procedures

Information Security What is Internet


Policy and Procedures marketing example?
Information Security How do you chat on
Policy and Procedures the Internet?
d7 Period 8
4.30 PM 4.30 PM to 5.30 PM
Inst code Subject Topic

User Versions of
Overview of
Information Security
Information Security
Policies

Computers History of Computers

Overview of
Senior Management
Information Security
Overview of
Availability:
Information Security

Module coverage
English Why learning English
is important

Computers History of Computers

Overview of
Information Security
Information Security
Benefits of
Overview of
Information of
Information Security
Security

Module coverage
English Why learning English
is important

Computers History of Computers

Overview of Security
Malware Symptoms
threats
Overview of Security
Cerberus
threats

Overview of Security
Active scanning
threats

Overview of Security Definition of 'Modus


threats Operandi'

Module coverage
English Why learning English
is important
Computers History of Computers

Overview of Security
Internal threats
threats

Communication Skills
Soft Skills - Verbal
communication

Information Security Products with Distinct


Vulnerabilities Vulnerabilities
Information Security Summary of
Vulnerabilities recommendations:

Information Security Undocumented third-


Vulnerabilities party relationships

Information Security Technology


Vulnerabilities Weaknesses

Computers History of Computers


Communication Skills
Soft Skills - Verbal
communication

Tips for Secure


Information Security
Browsing with Google
Vulnerabilities
Chrome

Module coverage
English Why learning English
is important

Computers History of Computers


Influence of Other
Risk Management
Factors

What Is the Value of


Risk Management
an Asset?

Computers History of Computers

Likelihood of
Risk Management
Occurrence
Purpose of Risk
Risk Management
Management

How to do a risk
Risk Management
assessment

Risk Management STEP APPROACH

: Decide who might be


Risk Management
harmed and how
Risk Assessment
Risk Management
Concepts

What injuries
Risk Management require Riddor
reporting?

Computers History of Computers

Module coverage
English Why learning English
is important
Communication Skills
Soft Skills - Verbal
communication

IT Act Provisions
Legal Framework Related to Digital
Signature

1. Keep the
Legal Framework Computer System Up-
To-Date

Computers History of Computers


Communication Skills
Soft Skills - Verbal
communication

Fully Developed
Legal Framework
Claim

Privacy of Sensitive
Legal Framework
Data

What is ibadah in
Legal Framework
accounting?
Relationship between
Privacy Protection
security and privacy

Privacy Protection Implementation

Computers History of Computers

Communication Skills
Soft Skills - Verbal
communication
What is the right to
Privacy Protection
rectification?

Computers History of Computers

What is personal
Privacy Protection
data processing?

What is the purpose


Privacy Protection
of a privacy notice?
Privacy Protection What is CIA triad?

How do you
Privacy Protection
become a spy?

Computers History of Computers

Information Security What is a computer


Policy and Procedures security policy?
Information Security What is a computer
Policy and Procedures security policy?

Develop information
Information Security
security policies and
Policy and Procedures
procedures

Information Security Information Security


Policy and Procedures Policy Rollout

Computers History of Computers


Key performance
Information Security
indicators for Change
Policy and Procedures
Management

Communication Skills
Soft Skills - Verbal
communication

Information Security What is international


Policy and Procedures selling?/

Computers History of Computers


Glossary A To Z
od 8
o 5.30 PM
Inst code
5
5
5
5
5
5

S-ar putea să vă placă și