INTRODUCTION FOR EFFECTIVE HUMAN FIREWALL: EMPOWERING CYBERSECURITY AWARENESS IN MALAYSIA
In the digital realm, the human element is often the weakest link in cybersecurity defences. The Effective Human Firewall workshop aims to transform participants from potential security vulnerabilities into robust pillars of defence against cyber threats. This immersive, hands-on workshop is specifically designed for the Malaysian context, addressing local cyber threats, compliance, and cultural nuances. Participants will leave not just more informed, but empowered to act as proactive defenders in the cyber landscape.
COURSE OBJECTIVES
By the end of the workshop, participants will be able to:
- Understand the cybersecurity landscape in Malaysia, including prevalent threats and compliance requirements.
- Identify and mitigate common cyber threats, such as phishing, social engineering, and malware.
- Implement best practices for personal and organizational cybersecurity hygiene.
- Develop a mindset of proactive vigilance and continuous learning in cybersecurity.
- Create and execute a basic personal or organizational cybersecurity response plan
DURATION
2 Days (16 hours)
INTENDED AUDIENCE
Individuals interested in cybersecurity, IT professionals, small business owners, and anyone keen on safeguarding their digital presence.
COURSE CONTENT
Day 1: Understanding Cyber Threats and Best Practices
Session 1:
- The Cyber Threat Landscape in Malaysia: Trends and Case Studies
- Cybersecurity Fundamentals: Terminology and Concepts
- Identifying Threats: Phishing, Malware, and Social Engineering
Session 2:
- Interactive Workshop: Recognizing and Reporting Phishing Attempts
- Personal Cyber Hygiene: Passwords, Two-Factor Authentication, and Beyond
- Group Discussion: Sharing Experiences and Strategies
- Day 1 Wrap-Up and Reflection
Day 2: Strengthening Defences and Building Resilience
Session 3:
- Protecting Your Digital Footprint: Privacy Settings and Social Media
- Hands-On Workshop: Setting Up Secure Home and Work Networks
- Legal and Compliance Aspects of Cybersecurity in Malaysia
Session 4:
- Creating a Personal/Organizational Cybersecurity Plan: Workshop
- Cybersecurity as Part of Everyday Life: Developing a Vigilant Mindset
- Role Play: Responding to a Cyber Incident
- Closing Ceremony: Certificates, Feedback and key takeaways
Interactive Elements
- Role-Playing Scenarios: Participants will engage in role-playing exercises to simulate response strategies to various cyber threats.
- Interactive Workshops: Hands-on sessions where participants apply what they’ve learned to real-world scenarios, such as setting up secure networks and identifying phishing emails.
- Discussion Groups: Small group discussions to share experiences, challenges, and strategies for improving cybersecurity practices.
- Gamified Learning: Use of cybersecurity quizzes and games to reinforce learning in an engaging manner.
This workshop aims not just to educate but to foster a community of informed individuals ready to tackle cybersecurity challenges. By focusing on interactive learning and practical skills, the program is designed to be engaging and applicable, encouraging widespread participation across Malaysia.