Skip to product information
1 of 2

Next Level Academy

Next Level Academy Cyber Security PLR eBook Course

Regular price $14.95
Regular price $59.00 Sale price $14.95
Sale Sold out

With our training courseware you can:

✔️ Customize the content to make the training more relevant to your audience (i.e. using examples and case studies from within your organization or city)
✔️ Completely customize it for your needs!
✔️ Print as many copies as you need.
✔️ Have unlimited users within your organization.
✔️ Add your name and logo (and remove ours).

With our training courseware you get:
✔️ eBook PDF File
✔️ eBook Word File
✔️ Quizzes Word File
✔️ Certification Word File

 

Module One: Getting Started

Every organization is responsible for maintaining records. The ability to create, organize, and maintain records and archives is essential to success. Correct records keeping will not only offer liability protection; it will also increase efficiency and productivity. To put it simply, maintaining records and archives will improve the bottom line.

Workshop Objectives

Research has consistently demonstrated that when clear goals are associated with learning, it occurs more easily and rapidly. With that in mind, let’s review our goals for today.

At the end of this workshop, participants should be able to:

Define records and archives

Analyze records in context

Classify records

Understand different systems

Maintain and convert records

Module One: Getting Started
  • Icebreaker
  • Housekeeping Items
  • The Parking Lot
  • Workshop Objectives
Module Two: Cyber security Fundamentals
  • What is Cyberspace?
  • What is Cyber security?
  • Why is Cyber security Important?
  • What is a Hacker?
  • Case Study
  • Module Two: Review Questions
Module Three: Types of Malware
  • Worms
  • Viruses
  • Spyware
  • Trojans
  • Case Study
  • Module Three: Review Questions
Module Four: Cyber Security Breaches
  • Phishing
  • Identity Theft
  • Harassment
  • Cyberstalking
  • Case Study
  • Module Four: Review Questions
Module Five: Types of Cyber Attacks
  • Password Attacks
  • Denial of Service Attacks
  • Passive Attack
  • Penetration Testing
  • Case Study
  • Module Five: Review Questions
Module Six: Prevention Tips
  • Craft a Strong Password
  • Two-Step Verification
  • Download Attachments with Care
  • Question Legitimacy of Websites
  • Case Study
  • Module Six: Review Questions
                                                              Module Seven: Mobile Protection
                                                              • No Credit Card Numbers
                                                              • Place Lock on Phone
                                                              • Don’t Save Passwords
                                                              • No Personalized Contacts Listed
                                                              • Case Study
                                                              • Module Seven: Review Questions
                                                              Module Eight: Social Network Security
                                                              • Don’t Reveal Location
                                                              • Keep Birthdate Hidden
                                                              • Have Private Profile
                                                              • Don’t Link Accounts
                                                              • Case Study
                                                              • Module Eight: Review Questions
                                                              Module Nine: Prevention Software
                                                              • Firewalls
                                                              • Virtual Private Networks
                                                              • Anti-Virus & Anti-Spyware
                                                              • Routine Updates
                                                              • Case Study
                                                              • Module Nine: Review Questions
                                                              Module Ten: Critical Cyber Threats
                                                              • Critical Cyber Threats
                                                              • Cyber terrorism
                                                              • Cyberwarfare
                                                              • Cyberespionage
                                                              • Case Study
                                                              • Module Ten: Review Questions
                                                              Module Eleven: Defense Against Hackers
                                                              • Cryptography
                                                              • Digital Forensics
                                                              • Intrusion Detection
                                                              • Legal Recourse
                                                              • Case Study
                                                              • Module Eleven: Review Questions
                                                              Module Twelve: Wrapping Up
                                                              • Words from the Wise
                                                              • Review of Parking Lot
                                                              • Lessons Learned
                                                              • Completion of Action Plans and Evaluations