Executive’s Guide to Cybersecurity
Lecturer
Daniels Marks Heincis
About the lecturer
Mg.Sc.Comp. Daniels Heincis is an experienced cyber security specialist with more than three years of professional experience in this field. His passion for computers and IT security started in his teenage years, which has made him a true industry enthusiast. As the Training Project Manager for Possible Security, Daniel has designed and delivered a variety of training programs with over 800 participants.
Daniel believes that cyber security and IT knowledge should be accessible and relevant to everyone, not just IT specialists. His trainings are distinguished by a practical and user-friendly approach, making cyber security understandable and interesting for every participant.
Course Description
The aim of the course is to refresh the knowledge and role of the course participants on cybersecurity hygiene, including security threats, current developments, with particular emphasis on the practical application of acquired knowledge.
Course Goals
The main types of cyber threats and their mechanisms.
How to work securely online, protecting both yourself and your company’s data.
The main risks associated with mobile device and remote work security.
About the regulations and guidelines governing IT security.
How to identify and respond to security incidents.
How to protect physical and digital infrastructure from potential attacks.
Where to find up-to-date information and resources for further professional development in cybersecurity.
After the course participants will be able to:
Apply secure practices, such as password management and secure data storage.
Recognize and prevent various types of cyberattacks in their daily work.
Ensure the security of their own and their company’s data while working remotely or on business trips.
Understand and comply with legislative requirements regarding IT security in the company.
Take the necessary steps in incident management to reduce potential losses and restore system security.
Ensure secure access to the company network and protect equipment from physical threats.
Independently keep up with the latest cybersecurity trends and update their knowledge.
Course will be:
In Person
Prerequisites
Teaching methods used:
- Lectures
- Discussions
- Participant material
- Role-play and analysis
- Presentations
- Teamwork, solo work, knowledge test
Introduction
Cybersecurity landscape: Global trends, incidents, and threats
Information theory and security fundamentals
Threat landscape: Targets, motivations, and attack vectors
Social engineering and deception tactics
Malware and cybercrime
Network and system vulnerabilities
Data security and privacy
Physical security risks
Remote work challenges
Cybersecurity Fundamentals
Employee role in information protection
Secure web browsing and email
Data protection and handling
Authentication and authorization
Password management and security
Endpoint protection
Data lifecycle management
Network security
Physical security controls
Regulatory compliance
Incident response and recovery
Conclusion
Continuous learning and adaptation
Additional resources
Lecturer
Daniels Marks Heincis
About the lecturer
Mg.Sc.Comp. Daniels Heincis is an experienced cyber security specialist with more than three years of professional experience in this field. His passion for computers and IT security started in his teenage years, which has made him a true industry enthusiast. As the Training Project Manager for Possible Security, Daniel has designed and delivered a variety of training programs with over 800 participants.
Daniel believes that cyber security and IT knowledge should be accessible and relevant to everyone, not just IT specialists. His trainings are distinguished by a practical and user-friendly approach, making cyber security understandable and interesting for every participant.
Course Description
The aim of the course is to refresh the knowledge and role of the course participants on cybersecurity hygiene, including security threats, current developments, with particular emphasis on the practical application of acquired knowledge.
Course Goals
The main types of cyber threats and their mechanisms.
How to work securely online, protecting both yourself and your company’s data.
The main risks associated with mobile device and remote work security.
About the regulations and guidelines governing IT security.
How to identify and respond to security incidents.
How to protect physical and digital infrastructure from potential attacks.
Where to find up-to-date information and resources for further professional development in cybersecurity.
After the course participants will be able to:
Apply secure practices, such as password management and secure data storage.
Recognize and prevent various types of cyberattacks in their daily work.
Ensure the security of their own and their company’s data while working remotely or on business trips.
Understand and comply with legislative requirements regarding IT security in the company.
Take the necessary steps in incident management to reduce potential losses and restore system security.
Ensure secure access to the company network and protect equipment from physical threats.
Independently keep up with the latest cybersecurity trends and update their knowledge.
Course will be:
In Person
Prerequisites
Teaching methods used:
- Lectures
- Discussions
- Participant material
- Role-play and analysis
- Presentations
- Teamwork, solo work, knowledge test
Introduction
Cybersecurity landscape: Global trends, incidents, and threats
Information theory and security fundamentals
Threat landscape: Targets, motivations, and attack vectors
Social engineering and deception tactics
Malware and cybercrime
Network and system vulnerabilities
Data security and privacy
Physical security risks
Remote work challenges
Cybersecurity Fundamentals
Employee role in information protection
Secure web browsing and email
Data protection and handling
Authentication and authorization
Password management and security
Endpoint protection
Data lifecycle management
Network security
Physical security controls
Regulatory compliance
Incident response and recovery
Conclusion
Continuous learning and adaptation
Additional resources