{"id":3201,"date":"2021-10-25T10:29:53","date_gmt":"2021-10-25T02:29:53","guid":{"rendered":"https:\/\/www.udshk.com\/?page_id=3201"},"modified":"2022-06-07T02:32:20","modified_gmt":"2022-06-06T18:32:20","slug":"security-awareness-training","status":"publish","type":"page","link":"https:\/\/www.udshk.com\/?page_id=3201","title":{"rendered":"Security Awareness Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3201\" class=\"elementor elementor-3201\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40696e8 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle elementor-invisible\" data-id=\"40696e8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b8f2057\" data-id=\"b8f2057\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aed6c1a elementor-widget elementor-widget-heading\" data-id=\"aed6c1a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Awareness Training<br>\nSAT V3.0<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51590a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"51590a4\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9ac2c69\" data-id=\"9ac2c69\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2cb2b77 elementor-invisible elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"2cb2b77\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div id=\"eael-advance-tabs-2cb2b77\" class=\"eael-advance-tabs eael-tabs-horizontal\" data-tabid=\"2cb2b77\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"eael-tab-inline-icon\">\n                                            <li id=\"objective\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"fas fa-medal\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Objective<\/span>\n                            \n                                                    <\/li>\n                                            <li id=\"who-should-attend-\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"far fa-address-card\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Who Should Attend ?<\/span>\n                            \n                                                    <\/li>\n                                            <li id=\"course-detail\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"far fa-file\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Course Detail<\/span>\n                            \n                                                    <\/li>\n                                    <\/ul>\n            <\/div>\n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"objective-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"objective-tab\">\n\t\t\t\t        \t\t\t\t\t        <p>In the current cyber threat landscape, knowledge is important but always in-sufficient. In order to keep an organization secure, you and your team are required to equip with the right skillsets and competencies. Our courses are designed for this equipment.<\/p>\n\n<p>This course addresses the fundamental concepts concerning security. The typical security threats related to general users on desktop and mobile are mentioned, and corresponding advices and best practices are discussed.<\/p>\n\n<h1>What can be learned<\/h1>\n\u2713 The basic cyber security concepts and how to identify vulnerabilities\/threat\n<br>\n\u2713 Understand the risk management framework for analysing the risks in a network system\n<br>\n\u2713 Apply the basic security design principles to protect the data and secure computer systems\t\t\t\t                            <\/div>\n\t\t        \n                    <div id=\"who-should-attend--tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"who-should-attend--tab\">\n\t\t\t\t        \t\t\t\t\t        <h1>Target Audience<\/h1>\n<ul>\n \t<li>General users who use desktop and\/or mobile in their works.<\/li>\n<\/ul>\n&nbsp;\n<h1>Prerequisites<\/h1>\n<li>Basic knowledge on Windows Systems<\/li>\t\t\t\t                            <\/div>\n\t\t        \n                    <div id=\"course-detail-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"course-detail-tab\">\n\t\t\t\t        \t\t\t\t\t        <h1>Topic<\/h1>\n<ul>\n \t<li>Definitions of cyber security<\/li>\n \t<li>Importance of cyber security<\/li>\n \t<li>Common types of network security, DLP, Cloud Security, IDS, IAM, Encryption \/ Antivirus<\/li>\n \t<li>Share case of how cyber attacks affecting financial industry with data supporting<\/li>\n \t<li>Who is affected by this cyber-attack damage (from government and national point of view)?<\/li>\n \t<li>Ransomware, Phishing, Spear Phishing and attack examples<\/li>\n \t<li>Techniques used by hackers: Tricky, Influencing, Deception<\/li>\n \t<li>Case study<\/li>\n \t<li>Mobile computing threats<\/li>\n \t<li>How to protect yourself and what you can do to prevent it from happening.<\/li>\n<\/ul>\n<ol>\n \t<li style=\"list-style-type: none;\">\n<ol>Password setting, Good social media behaviours and Theft protection<\/ol>\n<\/li>\n<\/ol>\n<ul>\n \t<li>Q&amp;A Session<\/li>\n<\/ul>\n&nbsp;\n<h1>Duration<\/h1>\n<ul>\n \t<li>1 hour<\/li>\n<\/ul>\n&nbsp;\n<h1>Medium of Instruction<\/h1>\n<li>English<\/li>\n<br>\n<h1>Award of Certificate<\/h1>\n<li>Participants will be awarded a certificate of attendance.<\/li>\t\t\t\t                            <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8a57c01 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8a57c01\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42495d2\" data-id=\"42495d2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d14c6cf elementor-widget elementor-widget-text-editor\" data-id=\"d14c6cf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIf you are interested in this course, please contact us via info@udshk.com or (+852) 2851-0271.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security Awareness Training SAT V3.0 Objective Who Should Attend ? Course Detail In the current cyber threat landscape, knowledge is important but always in-sufficient. In order to keep an organization secure, you and your team are required to equip with the right skillsets and competencies. Our courses are designed for this equipment. This course addresses [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3201","page","type-page","status-publish","hentry","entry","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"_links":{"self":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3201"}],"version-history":[{"count":43,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3201\/revisions"}],"predecessor-version":[{"id":4377,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3201\/revisions\/4377"}],"wp:attachment":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}