Information Self Security Course

Information Self Security Course

Categories:

Security Courses

Date:

13-Apr-2025

Duration:

Days 5

Location:

Istanbul
Image

Introduction

    The importance of training courses is not only limited to professional life, as most of us think but training courses aim to transfer knowledge and practical experiences that enrich the skills of individuals and enhance their self-confidence, which contributes to the preparation of cadres which in turn contributes to the development and progress of institutions. Therefore, Strategic Vision Training Center aims to enhance the skills and experiences of individuals through the strongest training programs to keep pace with every development in the labor market.

Objective

  • Training participants to understand the rules, foundations and elements of information security

  • Introducing participants to the risks that afflict users of the Internet and information systems at the personal level and in the workplace

  • Training participants on how to secure their personal sites

  • Introducing participants to the principles to be followed for the security of personal and work information to avoid exposure to penetration and leakage

  • Introducing participants to the security rules for dealing with information systems in workplaces in particular, personal computers and mobile phone devices

  • Develop abilities to understand the rules, foundations and elements of information security

  • Develop capabilities to understand the risks facing the user of the Internet and information systems and networks

  • Develop capabilities on how to secure personal accounts on different websites

  • Develop trainees' knowledge about the rules of information security that the user of information systems must follow in order not to be exposed to hacking or espionage

  • Develop knowledge about the rules, foundations and elements of information security

  • Developing capabilities to understand the risks facing the user of the Internet and information systems and networks

  • Capacity development on how to secure personal accounts on different websites

  • Developing knowledge about the rules of information security that the user of information systems must follow

Who should attend?

  • Police officers working in the field of criminal investigation and information analysis

  • Members of the Public Prosecution Office and judges

  • Government and private sector employees

  • Information security officers in the police and military sectors

  • lawyers

  • University faculty members

  • Security officials in institutions and companies

Course content:

1st Day

Describe what is meant by information security and its basic elements

  • Introducing information security and information self-security

  • Explain the basic elements of information security

  • An analytical study of the most famous cases of information breach and their causes

2nd Day

Risks facing Internet users and information systems and networks

  • Explaining the work of digital viruses and worms

  • Explain the methods of hacking and espionage

  • Explanation of the methods of penetration and the most famous cases of practical reality

3rd Day

Securing personal accounts on Facebook

  •  Explanation of the components and characteristics of the Facebook site

  •  How to create an account and secure it from hacking or spying

  •  How do you know if an account is hacked or spied on and what action can be taken to re-secure the account

4th Day

Securing personal accounts on Twitter and Google

  •  Explanation of the components and characteristics of Twitter

  •  How to create an account and secure it from hacking or spying

  •  How do you know if an account is hacked or spied on and what action can be taken to re-secure the account

5nd Day

Securing personal accounts on Instagram and WhatsApp

  • Explanation of the components and characteristics of Instagram and WhatsApp

  •  How to create an account and secure it from hacking or spying

  •  How do you know if an account is hacked or spied on and what action can be taken to re-secure the account

Training methods:

  • Case studies and practical exercises

  • Role-playing

  • Work simulation exercises

  • Related videos

  • Visual display

  • Group workshops

  • Guidance

Preparing the training bag

  • At Strategic Vision Training Center, we are always keen on providing the best standards for the training content we offer

  • Each program and training bag should include several axes:

           Analysis - Design - Development - Implementation – Evaluation

  • In addition to, specialized team in designing training materials with the best quality standards which is appropriate to the needs and variables of training

Preparation of the training environment

One of our top priorities

  • Choosing a training site, which is easy to be accessed by the trainees and that the training halls are suitable for the training program in terms of quality and luxury standards that we are keen on

The following factors are taken into consideration when choosing a training hall:

  •  General atmosphere (space - system - ventilation)

  •  Equipment of the hall (a place for rest periods - the quality of the offered food and beverage)