training programme
OSINT Cyber Hygiene

 

Let's do it safe(r)

What can happen, what to do?

Indifference and Ignorance are two of the main weapons used by cyber criminals and cyber warriors to get access to information they shouldn't get access to. You may lose your information position to the competition, lose your identity, lose your anonymity. You may even lose valuable information (patents, inventions, plans) that may cost you dearly.cyberwar

The Cyber Hygiene programme will share the most common risks associated with using the Internet, an overview of common cyber attacks, examples of information warfare, computer network exploitation and more importantly, what to do to protect yourself and why.

The programme is aimed at delegates who use the Internet often, work with sensitive data but are no cyber specialists. The programme is created with the cyber crime novice in mind. The programme aims to be practical.

The main emphasis is laid on techniques and tools to protect yourself against cybercrime, not on the theory. Tools and techniques to make your laptop safe(r), what to do to stay safe when in a hotel, what never to do when using a public WiFi (like in a hotel).

Example module

What you will learn..

At the end of the training, the delegate will be able to:

  1. Recognize and identify the most common cyber crime attacks that a diplomat may fall victim to ;
  2. Identity and understand the most important types of cyber warfare ;
  3. effectively protect his/her laptop against information theft, cyber crime ;
  4. use free tools to protect the laptop or PC against any form of cybercrime ;
  5. deploy essential personal countermeasures to protect against identity theft, information loss, disinformation and other common types of information warfare ;
  6. apply a set of practical, applicable techniques to protect one's own equipment ;
  7. use simple encryption software to encrypt files, directories and email ;
  8. Use passwords safely and wisely ;
  9. recognise and counter phishing email and spear phishing attempts ;

who should attend

The OSINT Cyber Hygiene programme is aimed at practitioners who are looking for practical and applicable techniques and tools to do the minimum to protect their information profile, without turning into forensic cyber security experts. More specifically, the Cyber Hygiene programme is ideal for:

  • Reuser_uitgelicht-650x400Generalists from the commercial and financial sector who work on a regular basis with sensitive data and need to know simple and effective ways how to protect that data ;
  • Diplomats, politicians who are not trained in cyber security and need to know entry-level techniques and procedures to prevent information theft and identity theft ;
  • Librarians and Information Professionals who work for government, semi-government, international governments in support of decision makers and need a refresher on the basic techniques ;
  • Journalists, investigative journalists, writers, historians who need more knowledge and practical capabilities on how to stay hidden, anonymous and prevent theft of their work ;
  • NGO's, people working in international conflict or crisis areas and need to know how to protect confidential and secret information  ;

What you will get

All RIS training programmes and workshops are well documented in a variety of support materials and services. The idea of the programme is to understand, not to learn tricks. The tricks are all documented in quick reference sheets and a handbook.

 What you get is :

  1. Three full days of OSINT training ;
  2. The RIS OSINT Handbook with all the details, in print, with table of contents and sources ;
  3. Extensive lunch and catering included ;
  4. Quick Reference Sheets with the full command languages of the major international search engines, including the 'secret' operators ;
  5. A hand-picked literature list for your background reading ;
  6. There will be an online training website for participants during and after the training programme ;
  7. One month after-care service by phone or e-mail for participants to ask questions to the teacher after the training ;
  8. Hand-signed RIS Pathfinder Certificate ;
  9. Group photograph (if required) ;

Agenda

CyberAgenda.v1

Leave a Comment