Professional certifications which make your key skills and focus study instantly recognisable internationally
Proact is an IBITGQ accredited training organisation. Our training courses offer a structured learning path from Foundation to Advanced level for IT practitioners and lead implementers and help to develop the skills needed to deliver best practice and compliance in an organisation. Certified training also provides the tools for career advancement via industry-standard certifications and increased peer recognition.
Our training courses are offered as classroom training, distance learning or in-house training. All our courses and examinations lead to accredited qualifications.
Our courses are designed to provide participants with a general understanding of the threats to cyber and information security that they face, help them to recognise the threats to their personal information, and respond to them appropriately including detailing the countermeasures that can be adopted. The programme has been developed on a modular basis and includes informative videos and short quizzes. It covers a wide range of topics to give participants an overview of the different cyber security threats and how to be safe on-line.
The Threat – This module provides an overview of the cyber threat landscape faced by individuals and organisations, outlining the impacts of cyber security incidents as well as tactics and strategies to aid cyber defence.
Passwords and password management – Passwords are the keys to sensitive data when using websites, email accounts and the computer itself. This module is designed to provide participants with an understanding of the importance of strong passwords along with some simple techniques to assist users in choosing and managing their passwords.
Phishing attacks – This module takes a detailed look at what phishing is, why it poses a threat and how participants can minimise their exposure to phishing attacks.
Social Engineering – This module looks at what social engineering is, who or what are social engineers, what they want, how they get it, and how to stop them Safe internet use – While the internet offers many benefits, this module is designed to highlight that there are several risks associated with going online – some general and some specific to the respective activities that the participants are undertaking – including threats to the integrity of their identity, privacy and the security of their financial transactions.
Online and mobile banking – Online banking is becoming ever more popular and most importantly it’s convenient and reasonably safe – if reasonable precautions are taken as detailed in this module.
Credit Card Use and Online shopping – This module identifies the steps that should be taken to make sure that the participants are shopping safely.
Social networking – Social media has revolutionised the way we communicate with others. We can now talk one-to-one or to large groups of people at once from the convenience of our computer or mobile device. This module identifies the ways in which ID fraudsters harvest sensitive information from these services and provides best practices to mitigate them.
Using wireless networks – This module provides an overview of the unsecure nature of wireless networks and how that risk can be mitigated. Antivirus software and installing updates – This module explains why it is necessary to install antivirus software and patches.
Malware – This module explores what is malware and the different types of malware and what should the participants do if they are infected.