1.1. Cyber Security
1.2. Module 1: Getting Started
1.3. Workshop Objectives
1.4. Module 2: Why Your Office Needs Administrative Procedures
1.5. What is Cyberspace?
1.6. What is Cyber Security?
1.7. Why is Cyber Security Important?
1.8. What is a Hacker?
1.9. Case Study
1.10. Module 3: Types of Malware
1.11. Worms
1.12. Viruses
1.13. Spyware
1.14. Trojans
1.15. Case Study
1.16. Module 4: Cyber Security Breaches
1.17. Phishing
1.18. Identity Theft
1.19. Harassment
1.20. Cyber Stalking
1.21. Case Study
1.22. Module 5: Types of Cyber Attacks
1.23. Password Attacks
1.24. Denial of Service Attacks
1.25. Passive Attack
1.26. Penetration Testing
1.27. Case Study
1.28. Module 6 : Prevention Tips
1.29. Craft a Strong Password
1.30. Two-Step Verification
1.31. Download Attachments with Care
1.32. Question Legitimacy of Websites
1.33. Case Study
1.34. Module 7: Mobile Protection
1.35. No Credit Card Numbers
1.36. Place Lock on Phone
1.37. Don’t Save Passwords
1.38. No Personalized Contacts Listed
1.39. Case Study
1.40. Module 8 : Social Network Security
1.41. Don’t Reveal Location
1.42. Keep Birthdate Hidden
1.43. Have Private Profile
1.44. Don’t Link Accounts
1.45. Case Study
1.46. Module 9: Prevention Software
1.47. Firewalls
1.48. Virtual Private Networks
1.49. Anti-Virus & Anti-Spyware
1.50. Routine Updates
1.51. Case Study
1.52. Module 10: Critical Cyber Threats
1.53. Critical Cyber Threats
1.54. Cyber Terrorism
1.55. Cyber Warfare
1.56. Cyber Espionage
1.57. Case Study
1.58. Module 11: Defense Against Hackers
1.59. Cryptography
1.60. Digital Forensics
1.61. Intrusion Detection
1.62. Legal Recourse
1.63. Case Study
1.64. Module 12: Wrapping Up