Fordefence training programs consist of main topics including "Theoretical and Technical Forensic Informatics Training, S.O.M.E. Training, Data Recovery Training, Information Security Awareness Training, White Hat Hacker Training, and Network Security Training." These programs aim to elevate fundamental informatics notions to a higher level through customizable training that blends theory and technique, catering to participants from all levels and professional backgrounds.
Duration of Information Security Training: 1 Day
Participant Profile:All computer and internet users
Requirements:
Basic: Knowledge of basic computer usage.
Training Location : Fordefence Forensic Informatics Laboratory (Fordefence Adli Bilişim Laboratuvarı / ŞİŞLİ / İSTANBUL) or Training Rooms of Institutions/Organizations
Training Methodology:
- Theoretical Knowledge
- Sampling
- Practical Exercises
- Case Studies
- Interactive Participation
- Participation Certificate
Description of Information Security Awareness Training:
With the advancement of technology worldwide, attackers exploit human vulnerabilities to infiltrate systems. Research indicates that one of the primary threats to information security is the lack of awareness among employees. Even if you consider your institution’s security to be high, malicious individuals may still attempt to infiltrate systems by exploiting human vulnerabilities. One of the best methods to prevent costly mistakes due to a lack of information security awareness among company employees is to organize information security awareness sessions. Employees lacking in information security awareness might access harmful websites, infect the internal network with malware, respond to phishing attacks, or fall victim to social engineering attacks. Our Information Security Awareness Training combines theoretical and practical aspects, presenting current global attacks and their solutions as part of the training.
Fordefence’s Information Security Awareness Training: prevents the institution’s most valuable asset, information, from being captured, damaged, destroyed, or accessed by unauthorized and malicious individuals.
Fordefence’s primary distinction from other training institutions is that all of its instructors possess technical, legal, and investigative skills. !
Training Scope;
- What is Information?
- Where is Information Found?
- What is Information Security?
- What Threats Does Information Face?
- What Do We Mean by Proper Protection?
- Office Security
- Internet Usage Security
- Email Usage Security
- Portable Devices and Security
- Password Security
- Social Media Usage and Security
- Information Security Policy
- Acceptable Use of Assets
- Clean Desk Clean Screen
- Visitors and Security
- Customer Confidentiality
- Working with Suppliers
- Information Security Incident and Vulnerability Reporting
- Personal Data Protection
- Social Engineering