Documente Academic
Documente Profesional
Documente Cultură
Workshop – RM 1288.00
6th November 2019 Empire Hotel Subang Jaya
Program Overview
Technology has made it increasingly easy to store, access, maintain, share &
alter information or data anytime, anywhere. This seamless flexibility is bound
to come with risks of the data falling into unwanted hands. Proper awareness
will can help negate the most common methods used by hackers to gain access
to your data.
Objective
Candidates can expect to gain knowledge and understanding in the following
upon successful completion of the education and examination components
related to this certification.
• Understand the meaning of information
• Understand the key importance of cybersecurity
• Learn the basic methods of cybersecurity
• Be cautious with information stored on electronic devices
• Be able to take appropriate security measures when using information over
electronic devices
Target Audience:
• Everyone with access to electronic devices
Organised By:
Cybersecurity Awareness
Workshop – RM 1288.00
6th November 2019 Empire Hotel Subang Jaya
Workshop Outline
Module 1 – Information security risks • Section 2.4 – Physical security outside the
• Introduction to Information & importance of workplace Outlines some of the information
information security concepts security risks that can be encountered when
• Network fundamentals working outside the workplace, for example
• Section 1.2 – What is information security? working from home or travelling to other
Introduces the concept of information security in locations.
practical terms with reference to the everyday • Section 2.5 – Risks of carrying electronic
workplace environment. devices Explains some of the particular risks
• Section 1.3 – Why is information security that are associated with carrying electronic
important? Gives an overview of the importance of devices such as smartphones.
information security awareness.
• Section 1.4 – Consequences of security breaches Module 3 – Computer and network security
Provides examples of some of the negative • Section 3.1 – Welcome Provides a brief
outcomes that can result from information security orientation to the topics covered in the
breaches. module.
• Section 1.5 – The essential role you play Highlights • Section 3.2 – Your computer and network
the importance of everyone in the workplace policies Emphasises the importance of
doing their part to support information security following the proper workplace policies and
policies and procedures. procedures, even if the reasons for them are
not understood.
Module 2 – Physical security • Section 3.3 – Understanding information
• Section 2.1 – Welcome Provides a brief orientation technologies Gives a non-technical explanation
to the topics covered in the module. of key terms related to computers and
• Section 2.2 – Physical security in the workplace computer networks.
Explains what is meant by physical security with • Section 3.4 – Reporting incidents or concerns
examples relevant to the workplace environment. Highlights the importance of reporting
• Section 2.3 – Security-conscious work habits computer and network security issues and
Highlights the importance of developing good responding quickly.
work habits that help to maintain physical security.