DL26 - Cyber #3 - Cyber Awareness , POPIA, PAIA and Information Security Frameworks

Full Description
  • How hackers can socially engineer you through email, SMS text, phone calls, browsing, downloaded files, mobile phones, etc
  • How to stop attacks, by spotting red flags in phishing emails, text messages and phone calls
  • How to securely use Windows, Apple Macs, iPhones, Androids etc
  • Proven and effective cyber security software to keep your systems private and secure
  • How to feel safe, secure, and private on the Internet
  • The common human emotions that hackers like to trigger, to trick you into giving them access to your money, personal accounts, systems and company network
  • Securely configure your browser to block malicious scripts, cookies, trackers etc. as well as maintain good privacy/anonymity on the Internet
  • How to effectively and efficiently manage all your passwords
  • Confidently manage your emails, business files, computers, mobile devices and Internet browsing

Information system security is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical aspect of modern technology and business operations as our dependence on digital information and communication continues to grow. This course takes the information security field as a whole and is well suited to anyone wondering what people mean when they use the term information security, or anyone interested in the field and wondering where to start. The course will begin with a basic introduction to Information Security covering its fundamental concepts and terminologies. Following this, you will understand the risk that comes with it. Moving ahead, you will gain a basic understanding of the information systems, and their development through the SDLC process. You will also learn about the most common and effective attacks on the weakest link by defining social engineering and explaining phishing, smishing, and vishing. Further in this course, you will learn what cryptography is, and about symmetric and asymmetric cryptography. Lastly, you will explore what Information Security Policy is. After completing this course, you will have gained an understanding of the core principles of information security to help you better protect your IT and business infrastructure, as well as the people of the organization.

The Protection of Personal Information Act, No 4 of 2013 (“POPIA”) will directly affect your business. The Act brings a wave of change after the grace period for full implementation expired on 1 July 2021. POPIA in itself is very technical and comprises of eight condtions for lawfull processing of personal information. POPIA entrench the fundamentals of fairness, risk and compliance. We aim to simplify the Act to make it practically applicable to your business and demistify the duties of the Information Officer and concepts such as the impact assessment, compliance framework and much more.

The Promotion of Access to Information Act (PAIA), Act No. 2 of 2000, seeks to, inter alia, give effect to the constitutional right of access to any information held by the state or by any other person where such information is required for the exercise or protection of any right.

Start Date
TO BE SCHEDULED
Sessions
6
Course Type
Distance Learning
Cost
R1 950.00

Module 1 : Cyber Awareness

  • How hackers can socially engineer you through email, SMS text, phone calls, browsing, downloaded files, mobile phones, etc
  • How to stop attacks, by spotting red flags in phishing emails, text messages and phone calls
  • How to securely use Windows, Apple Macs, iPhones, Androids etc
  • Proven and effective cyber security software to keep your systems private and secure
  • How to feel safe, secure, and private on the Internet
  • The common human emotions that hackers like to trigger, to trick you into giving them access to your money, personal accounts, systems and company network
  • Securely configure your browser to block malicious scripts, cookies, trackers etc. as well as maintain good privacy/anonymity on the Internet
  • How to effectively and efficiently manage all your passwords
  • Confidently manage your emails, business files, computers, mobile devices and Internet browsing

 

Module 2 : POPIA, PAIA and Information Security Frameworks

Information system security is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical aspect of modern technology and business operations as our dependence on digital information and communication continues to grow. This course takes the information security field as a whole and is well suited to anyone wondering what people mean when they use the term information security, or anyone interested in the field and wondering where to start. The course will begin with a basic introduction to Information Security covering its fundamental concepts and terminologies. Following this, you will understand the risk that comes with it. Moving ahead, you will gain a basic understanding of the information systems, and their development through the SDLC process. You will also learn about the most common and effective attacks on the weakest link by defining social engineering and explaining phishing, smishing, and vishing. Further in this course, you will learn what cryptography is, and about symmetric and asymmetric cryptography. Lastly, you will explore what Information Security Policy is. After completing this course, you will have gained an understanding of the core principles of information security to help you better protect your IT and business infrastructure, as well as the people of the organization.

The Protection of Personal Information Act, No 4 of 2013 (“POPIA”) will directly affect your business. The Act brings a wave of change after the grace period for full implementation expired on 1 July 2021. POPIA in itself is very technical and comprises of eight condtions for lawfull processing of personal information. POPIA entrench the fundamentals of fairness, risk and compliance. We aim to simplify the Act to make it practically applicable to your business and demistify the duties of the Information Officer and concepts such as the impact assessment, compliance framework and much more.

The Promotion of Access to Information Act (PAIA), Act No. 2 of 2000, seeks to, inter alia, give effect to the constitutional right of access to any information held by the state or by any other person where such information is required for the exercise or protection of any right.

To book and register for training courses, you must be logged in.