{"id":3203,"date":"2021-10-25T10:30:14","date_gmt":"2021-10-25T02:30:14","guid":{"rendered":"https:\/\/www.udshk.com\/?page_id=3203"},"modified":"2022-06-07T02:30:35","modified_gmt":"2022-06-06T18:30:35","slug":"phishing-training","status":"publish","type":"page","link":"https:\/\/www.udshk.com\/?page_id=3203","title":{"rendered":"Phishing Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3203\" class=\"elementor elementor-3203\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-12404b2 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle elementor-invisible\" data-id=\"12404b2\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06c87d5\" data-id=\"06c87d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-022d7ea elementor-widget elementor-widget-heading\" data-id=\"022d7ea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing Training<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a2bec24 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"a2bec24\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d0caf8\" data-id=\"0d0caf8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c25abc elementor-invisible elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"9c25abc\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div id=\"eael-advance-tabs-9c25abc\" class=\"eael-advance-tabs eael-tabs-horizontal\" data-tabid=\"9c25abc\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"eael-tab-inline-icon\">\n                                            <li id=\"objective\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"fas fa-medal\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Objective<\/span>\n                            \n                                                    <\/li>\n                                            <li id=\"who-should-attend-\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"far fa-address-card\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Who Should Attend ?<\/span>\n                            \n                                                    <\/li>\n                                            <li id=\"course-detail\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"far fa-file\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Course Detail<\/span>\n                            \n                                                    <\/li>\n                                    <\/ul>\n            <\/div>\n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"objective-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"objective-tab\">\n\t\t\t\t        \t\t\t\t\t        Human factor (what employees do or don't do) is the biggest threat to information systems and assets. Cyber-attacks and breaches in data security and IT security happen every day. Many presume that software gaps or technology mistakes wholly contribute to these attacks, but in reality, human mistakes contribute about 31% of these cyber breaches.\n<br><br>\n\nBuilding a systematic tailor-made Human Firewall with advance technology is most effective way to protect from phishing attacks and cyber breaches. Human firewall can be defined as the personal or sentimental aspect of guarding one\u2019s network. Human firewalls centre on security awareness training at every organisational level. This systematic security awareness training will teach humans to be super sensitive to vulnerabilities they are able to pinpoint and take necessary steps to alleviate or minimise risks which automated systems cannot control.\n<br><br>\n\nThis is an interactive anti-phishing workshop that helps you understand how phishing attacks work, the tactics that cyber criminals employ, how to spot and avoid a potential attack and most importantly you\u2019ll be improve yourself and less vulnerable to phishing attacks.\t\t\t\t                            <\/div>\n\t\t        \n                    <div id=\"who-should-attend--tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"who-should-attend--tab\">\n\t\t\t\t        \t\t\t\t\t        <h1>Target Audience<\/h1>\n<ul>\n \t<li> All computer end users.\n<\/li>\n<\/ul>\n<h1>Prerequisites<\/h1>\n<ul>\n \t<li>Using Internet \/ email service experience.<\/li>\n<li>A mobile smartphone with WIFI \/ internet connection.<\/li>\n<\/ul>\t\t\t\t                            <\/div>\n\t\t        \n                    <div id=\"course-detail-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"course-detail-tab\">\n\t\t\t\t        \t\t\t\t\t        <h1>Topic<\/h1>\n<ul>\n \t<li>What is phishing?<\/li>\n \t<li> Types of Phishing. <\/li>\n \t<li> How to distinguish phishing emails? <\/li>\n \t<li> Know-how Common phishing email features. <\/li>\n \t<li> How to build a Human Firewall using advanced technology. <\/li>\n \t<li> In class phishing scenario tests for group discussion. <\/li>\n \t<li> In class phishing game quiz. <\/li>\n \t<li> Free after-class phishing test. <\/li>\n<\/ul>\n<h1>Duration<\/h1>\n<ul>\n \t<li>3 hours.<\/li>\n<\/ul>\n<h1>Medium of Instruction<\/h1>\n<ul>\n \t<li>Cantonese (complemented with English terms)\n(English terms will be used where appropriate)<\/li>\n<\/ul>\n<h1>Class Size<\/h1>\n<ul>\n \t<li>50 persons<\/li>\n<\/ul>\n<h1>Award of Certificate<\/h1>\n<ul>\n \t<li>Participants will be awarded a certificate of attendance.<\/li>\n<\/ul>\t\t\t\t                            <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-834a845 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"834a845\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-277e054\" data-id=\"277e054\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52661a1 elementor-widget elementor-widget-text-editor\" data-id=\"52661a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIf you are interested in this course, please contact us via info@udshk.com or (+852) 2851-0271.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing Training Objective Who Should Attend ? Course Detail Human factor (what employees do or don&#8217;t do) is the biggest threat to information systems and assets. Cyber-attacks and breaches in data security and IT security happen every day. Many presume that software gaps or technology mistakes wholly contribute to these attacks, but in reality, human [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3203","page","type-page","status-publish","hentry","entry","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"_links":{"self":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3203"}],"version-history":[{"count":28,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3203\/revisions"}],"predecessor-version":[{"id":4374,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3203\/revisions\/4374"}],"wp:attachment":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}