IT Security Awareness Training

Image

Our Training Program

The IT Security program is designed to equip individuals and professionals with the knowledge and skills needed to manage security threats and common exposures to ensure high security lifestyle for their lives and property whiles using mobile phones, tablets, laptops, desktops, Printers and Copiers etc for business and pleasure.

HAVE YOU EVER ASKED YOUR THIS QUESTION?

  • Why is my mobile phone, tablet or laptop so slow?
  • Can someone really listen to my mobile phone calls without my permission?
  • Someone stole my Facebook password, how did they do it and how can I protect myself?
  • How do I know I am being hacked because I am not an IT person?
  • I download movies on my computer, but are they safe?
  • How do I know I am being followed from work?
  • Can someone really take a photo from my mobile phone without my password and permission?
  • Someone installed a cracked software on my server, computer, mobile phone and tablet, it is cheap but is it safe?
  • I use a mobile phone, tablet and laptop with a camera, how safe is it
  • I use a “china” phone and tablet, it is cheap and works fine but are they safe?
introductiontocybersecurity_409344172.jpg
13418371_10156928708240577_4375323429732241283_o.jpg

LEARNING OUTCOMES:

Participants enrolled in this course would be able to:

  • Interpret security threats and behaviours in their environments
  • Analyse the security problem and determine the appropriate mitigation measures.
  • Implement the appropriate IT-Security Protocols that can be used to protect life and property.
  • Develop appropriate IT-Security Protocols to protect yourself and those who keep you in business.
  • Understand the global impact of IT Security vulnerability on Governance and businesses (Electoral fraud, manufacturing and Financial Institution hacking)
  • Understand impact of IT Security vulnerability on homes and country.
  • Understand Social engineering and why its popular these days
  • Protecting your mobile phone & Tablets & Laptops
  • Protecting yourself & home | tips on personal security
  • Where to find more information

COURSE CONTENT:

  • Introduction to information security 
  • Practical tips – hard copy information 
  • Practical tips – electronic information 
  • Acting proportionately 
  • Security breaches 
  • Where to find more information
13411809_10156928707635577_831127780749927522_o-1.jpg

 


WHO SHOULD TAKE THE COURSE

IFT-CATEGORY I

The course sessions are suitable for Business Chief Executive Officers, Managing Directors, CFOs, COOs,


IFT-CATEGORY II

Financial Institution- Banks, Rural Banks, Savings and Loans, Microfinance, Non-Bank Financial Institutions, Educational institutions- Universities, Colleges, Polytechnic, Training Institutes, SHS Managers, JHS Managers, Private Schools Managers, Pre-school Managers and Operators.


IFT-CATEGORY III

Head of Departments and Line managers, Marketers and Salespersons, Finance department, Audit department, production/manufacturing department. Human Resource/Personnel department, Operations department, Personal Assistants, Administrators, Accounts Managers, 


IFT-CATEGORY IV

Immigration, Police, Aviation, Flights Attendants, Cabin Crew, Hotel Managers and workers, Restaurants operators and Supply Chain Managers Night-Clubs and shops.


IFT-CATEGORY V

Electoral Commissioners, NIA, DVLA, NHIS, Doctors, Nurses and other health workers,


IFT-CATEGORY VI

Media practitioners and journalists, Bodyguards and Chauffeur, Home and Office Security, 


IFT-CATEGORY VII

member within those targeted sectors who requires vital information and guidance on effectively implementing information security measure, Data stewards and information managers. 

Footer Logo

We believe  in  simplified  solutions  that  leave  businesses  to  focus  on  their  core  mandate knowing technology  just works.

Subscribe with us to get all the latest messages from our services and new products

Search