CYBER SECURITY EDUCATION 2020

CYBERSECURITY EDUCATION

LANGUAGE: Languages used for the training: English, but many languages for 6+ groups. The language of the course can be arranged according to the characteristics of the groups in English, German, Italian, Spanish and Turkish.

COURSE SPECIFICATIONS:
Number of Training Days:5 Days
Lessons per week: 30 English Language
Lesson Duration: 09:00-15:00 for a day

Length and fees: 70 Auro per a day/person

Class Size: Maximum 20
Language level: A1/A2
Suitable for: School administrators, school staff, teachers and Everyone

COURSE BACKGROUND AND COURSE OVERVIEW:

Cybersecurity is an issue that is needed to be learned in our modern world. The course will be contented with the ICS (International Control Security) and SCADA (Supervisory Control and Data Acquisition). The importance of online security and the crucial facts of the personal and identification should be comprehended and understood by the people living in a society. So, this course will be related to the personal skill of a person using the cyber with safety and without losing and sharing special and personal data.

COURSE OBJECTIVES:

-Defending the personal computers from cyber-attacks such as DDoS attacks, trojans, and all kinds of harmful attacks on the virtual world.

-To reach the points: cybersecurity, malware, password security, encryption, and preventing cyberbullying

-To improve the cyberspace and virtual skills of the persons.

-To reach the world without being harmed by the attacks.

CONTENT AND METHODOLOGY:

The fact is that there are so many different areas where IT security can be compromised, and the more complicated the IT infrastructure being used, the greater the risk.

This means that experts in cybersecurity have become increasingly in demand, to the one where it is commonly claimed that cybersecurity is one area with zero unemployment. Demand very much outstrips supply.

However, becoming an expert in cybersecurity requires a combination of qualifications and experience, and while achieving certificates can help build up a career to provide that experience, there are a bewildering array of course and training options for studying cybersecurity.

METHODS:

Lectures, exercises, discussions, teamwork, role-playing, study visits

COURSE TOPICS:

Cyberspace

-Preventing the harmful cyberattacks

-Protecting personal identity and data

Program (Training activities):

-PPT slides

-discussions

-evaluating

-sharing thoughts and ideas with the group

-sightseeing and the visits 

PREPARATION:

After confirming registration, participants will be informed about the details of the course (arrival, daily program). Participants will be able to introduce themselves and bring a few examples of routines and practices that they apply to their teaching.

MODULES:

Module1: Cyberspace

Module2: Cyber-safety

Module3: Protecting the personal data

FOLLOW UP:

The acquisitions that the participants will gain at the end of the course:

They will be able to protect their personal data from the villains that make the cyber attacks

-They will able to find the opportunity to protect their mobiles, personal computers from who wants to steal their personal information

DAILY TIMETABLE:

1ST DAY

(09:00-15:00)

-Welcome to the participants

-A quick introduction to the course

-Recognizing the threats for an organization in the business

Coffee Break

-Introduction of the important business system and assets

-Discussion

2ND DAY

(09:00-15:00)

-The needs of the course and analyzing

-The specialized definition of a cybersecurity

-The important roles of the leadership management in cyber-risk

Coffee Break

-Understanding the technology

-Discussion

3RD DAY

(09:00-15:00)

-Introduction of the threats of the cybersecurity

-The harms of the cyberattacks to the real lives of the persons

Coffee Break

-Cyber risks and the laws for it

-Discussion

4TH DAY

(09:00-15:00)

-Evaluation

-City tour

-Orientation activities

5TH DAY

(09:00-15:00)

-Sightseeing

-Distribution of the certificates

Goodbye..

CERTIFICATIONS: At the end of the course; Participants will take ”Certificate of Participant”, ”Europass Mobility Certificate”, ”Staff Mobility Agreement‘‘ and BlueCore International Company Invoice certificates.

 

You can follow course dates, locations and application processes here!