Documente Academic
Documente Profesional
Documente Cultură
9 AM to 10 AM
Day Subject Topic
Module coverage
3 English
Why learning English is important
4 Computers History of Computers
Overview of Information
6 Costs of information
Security
Module coverage
7 English
Why learning English is important
8 Computers History of Computers
Overview of Security
9 Conventional vs. New Threats
threats
Overview of Security
11 Inadequate Security Technology
threats
Overview of Security
12 Malware Prevention and Removal
threats
Module coverage
13 English
Why learning English is important
Overview of Security
15 Breaking down 'Modus Operandi'
threats
Overview of Security
16 Get the Analyst Report
threats
Communication Skills
19 Soft Skills - Verbal communication
Module coverage
20 English
Why learning English is important
Information Security
23 Weakness Description
Vulnerabilities
Information Security Best practices for minimizing security
24
Vulnerabilities and privacy risk
Communication Skills
35 Soft Skills - Verbal communication
Evaluate the risks and decide on
36 Risk Management
control measures
Communication Skills
38 Soft Skills - Verbal communication
Communication Skills
46 Soft Skills - Verbal communication
Communication Skills
53 Soft Skills - Verbal communication
Information Security
66 Finance & Accounting module:
Policy and Procedures
69
70
71
72
73
74
75
76
77
78
Period 2
M 10 AM to 11 AM
Inst code Subject Topic
Overview of Information
Technical Control
Security
Overview of Information
Third Parties
Security
Overview of Information
Dimensions of Information Security
Security
Overview of Information
Data Management
Security
Overview of Security
· Conventional Threats
threats
Overview of Security
SAINT
threats
Overview of Security
Modus Operandi Examples
threats
Overview of Security
Detection
threats
5 Information Security
Internal Network Security
Vulnerabilities
Information Security
SQL Injection
Vulnerabilities
Information Security
Unauthenticated protocols
Vulnerabilities
Information Security
Weaknesses in Online e-transactions
Vulnerabilities
Information Security
Configure privacy settings
Vulnerabilities
Information Security
Vulnerabilities Is Chrome safer than edge?
Risk: The Good, the Bad, and the
Risk Management
Necessary
Information Security
Policy Introduction
Policy and Procedures
Information Security
Internet Marketing
Policy and Procedures
Information Security
Types of advanced modules.
Policy and Procedures
Communication Skills
Soft Skills - Verbal communication
When is the right time to
Overview of Information
address Information
Security
Security?
Overview of Information
Intranet/Internet
Security
Overview of Security
What is Malware?
threats
Overview of Security
Probing the Network
threats
Overview of Security
Nessus
threats
Information Security
Security vulnerability type
Vulnerabilities
Information Security
Outdated hardware
Vulnerabilities
Misconfiguration of
Information Security
security and network
Vulnerabilities
devices
Information Security Best practices to help you
Vulnerabilities reduce cloud attacks
Information Security
Malware
Vulnerabilities
Absolute Valuation
Risk Management
Methods
4. Secure Configuration
Legal Framework
of the System
Legal Framework Making a Choice
How Is Evidence
Legal Framework
Processed?
Assess privacy
Privacy Protection implications of security
technologies
What is impact
Privacy Protection assessment and why is
it important?
Privacy Protection What is Pia short for?
What is GDPR
Privacy Protection
personal data?
What is the
Privacy Protection importance of the
CIA?
Information Security
Security Framework
Policy and Procedures
Information Security
ISO 17799
Policy and Procedures
Information Security
Security Practices
Policy and Procedures
What is an
Information Security
Policy and Procedures organizational security
policy?
Ways to Improve
Information Security
Collaboration Between
Policy and Procedures
Departments
What is Internet
Information Security
Policy and Procedures marketing in simple
English?
Information Security How many types of
Policy and Procedures chat are there?
Activity Cum Lesson Planner - Accounts Assistant Using T
3 Period 4
12 PM 12 PM to 1 PM
Inst code Subject Topic
Module coverage
English Why learning English is
important
Recall alphabets
English Recall vowels and
consonants
Family Relationships
- Some common
5 English occupations
- Names of fruits and
vegetables, Animals
English Student Activity
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
Module coverage
English Why learning English is
important
OJT Hou
son Planner - Accounts Assistant Using Tally (ICT701)
d4 Period 5
1 PM 1.30 PM to 2.30 PM
Inst code Subject Topic
Overview of Information
parallel approach
Security
Overview of Information
Value of information
Security
Overview of Information
What is the Internet?
Security
Overview of Security
Former employees
threats
Communication Skills
Soft Skills - Verbal communication
Overview of Security
Net Cop
threats
Overview of Security
Net Stat Live
threats
Overview of Security
Start scanning inside
threats
Overview of Security
External threats
threats
Overview of Security
Enforcement
threats
Communication Skills
Soft Skills - Verbal communication
Communication Skills
Soft Skills - Verbal communication
Information Security
Increased Security Risks
Vulnerabilities
Foundational Concepts of
Legal Framework
Law
Historic Examples of
Legal Framework
Computer Crimes
Legal Framework Warning Letters
Communication Skills
Soft Skills - Verbal communication
5. Choose a Strong
Legal Framework
Password and Protect It
Investigation of Any
Legal Framework
Crime
Privacy impact
Privacy Protection
assessment
Advancing technology
Privacy Protection can manipulate the public
based on their private data
Communication Skills
Soft Skills - Verbal communication
What is a privacy
Privacy Protection
threshold assessment?
Why is information
Privacy Protection
security important?
Communication Skills
Soft Skills - Verbal communication
Information Security
Security Policy
Policy and Procedures
Information Security
Security Compliances
Policy and Procedures
Security Compliance
Information Security
Grows Even More
Policy and Procedures
Challenging
Information Security
Compliance
Policy and Procedures
What is Internet
Information Security
Marketing? What is
Policy and Procedures
chatting?
Information Security
Scheduled triggers
Policy and Procedures
OJT Hours
d5 Period 6
2.30 PM 2.30 PM to 3.30 PM
Inst code Subject Topic
Definition of a computer
Computers Basic Operations of a
computer
Block diagram of a
Computers
computer Hardware
Basic Terms
Computers
Operating system
Input/Output devices
Computers
Central Processing Unit
Specifications of a
Computers
computer
Application softwares
Computers
Student activity
Computers Student Activity
Windows Nomenclature
Computers
Creating Files and Folders
Windows Nomenclature
Computers
Creating Files and Folders
5 Installing simple
Computers
softwares
Installing simple
Computers
softwares
Windows Nomenclature
Computers
Creating Files and Folders
Windows Nomenclature
Computers
Creating Files and Folders
Windows Nomenclature
Computers
Creating Files and Folders
Windows Nomenclature
Computers
Creating Files and Folders
MS Word
- Use of MS word
5 - Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
5 - Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
Basic Terms
Computers
Operating system
MS Word
- Use of MS word
5 - Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
MS Word
- Use of MS word
- Word Processing
Computers
concepts
- Create, Save, Edit,
Format a document
Basic Terms
Computers
Operating system
Basic Terms
Computers
Operating system
5 Word and Excel
Computers
Formatting
Basic Terms
Computers
Operating system
Basic Terms
Computers
Operating system
d6 Period 7
3.30 PM 3.30 PM to 4.30 PM
Inst code Subject Topic
Information Security
Overview of Information
Policy Regulatory
Security
Requirements
Overview of Information
Top-down Approach
Security
Overview of Information
Integrity:
Security
Overview of Information
Business Dimension
Security
Overview of Information
What is an Intranet?
Security
Definition of Information
Overview of Information
Security and Cyber
Security
security
Overview of Information It’s Already Happening,
Security and Has for a While
Overview of Security
Outdated Security Software
threats
Overview of Security
Ransom ware
threats
Overview of Security
Net Brute
threats
Overview of Security
Scanning of threats
threats
Overview of Security
Modus Operandi
threats
Information Security
Bad data storage practices
Vulnerabilities
What Is a Threat
Risk Management
Source/Agent?
Why do a risk
Risk Management
assessment?
Different Approaches to
Risk Management
Risk Analysis
PIA is designed to
Privacy Protection
accomplish three goals
What is a Privacy
Impact Assessment
Privacy Protection PIA is an analysis of
how information is
handled?
What is privacy
Privacy Protection
enhancing software?
Why is GDPR
Privacy Protection
important?
What is a Privacy
Privacy Protection Impact Assessment
GDPR?
What are the three
Privacy Protection principles of the CIA
triad?
Streamlining Security
Information Security Compliance Initiatives
Policy and Procedures with Compliance
Management
Information Security
Instant triggers
Policy and Procedures
User Versions of
Overview of
Information Security
Information Security
Policies
Overview of
Senior Management
Information Security
Overview of
Availability:
Information Security
Module coverage
English Why learning English
is important
Overview of
Information Security
Information Security
Benefits of
Overview of
Information of
Information Security
Security
Module coverage
English Why learning English
is important
Overview of Security
Malware Symptoms
threats
Overview of Security
Cerberus
threats
Overview of Security
Active scanning
threats
Module coverage
English Why learning English
is important
Computers History of Computers
Overview of Security
Internal threats
threats
Communication Skills
Soft Skills - Verbal
communication
Module coverage
English Why learning English
is important
Likelihood of
Risk Management
Occurrence
Purpose of Risk
Risk Management
Management
How to do a risk
Risk Management
assessment
What injuries
Risk Management require Riddor
reporting?
Module coverage
English Why learning English
is important
Communication Skills
Soft Skills - Verbal
communication
IT Act Provisions
Legal Framework Related to Digital
Signature
1. Keep the
Legal Framework Computer System Up-
To-Date
Fully Developed
Legal Framework
Claim
Privacy of Sensitive
Legal Framework
Data
What is ibadah in
Legal Framework
accounting?
Relationship between
Privacy Protection
security and privacy
Communication Skills
Soft Skills - Verbal
communication
What is the right to
Privacy Protection
rectification?
What is personal
Privacy Protection
data processing?
How do you
Privacy Protection
become a spy?
Develop information
Information Security
security policies and
Policy and Procedures
procedures
Communication Skills
Soft Skills - Verbal
communication