Call Us 905.764.3773
 
 
 
Seminars
Home About Approach Services Seminars Products Contact
 
 

Featured Seminar

Cybersecurity Awareness: An Introduction for End-Users

Cybersecurity, data privacy, password management, social-engineering, encryption, malware and the cloud – your employees need to be aware of these topics. Although your network may be locked, every employee still has a key. Cybersecurity Awareness: An Introduction for End-Users educates your employees (at any position or degree of technical comfort) about today’s threats and how to avoid being compromised by the bad-guys.

Featured Seminar

Cybersecurity Awareness: An Introduction for End-Users

Cybersecurity, data privacy, password management, social-engineering, encryption, malware and the cloud – your employees need to be aware of these topics. Although your network may be locked, every employee still has a key. Cybersecurity Awareness: An Introduction for End-Users educates your employees (at any position or degree of technical comfort) about today’s threats and how to avoid being compromised by the bad-guys.

Seminar Abstract

Cybersecurity Awareness: An Introduction for End-Users balances three key elements:

  • an overview of the bad-actors, who they are, how they operate, and why
  • how end-users fulfill their part as the “human firewall” in the larger security effort
  • your specific policies and procedures, and how to follow them

Cybersecurity Awareness: An Introduction for End-Users is a comprehensive seminar centred around a lively lecture, mixed with in-the-news examples, engaging stories, and incorporating audience questions throughout. It can be tailored for employees with any level of technical savvy, or none at all.

From the top to the bottom of your organization, anyone with access to your systems is a potential target for bad-actors to exploit. Have you provided adequate training?

Seminar Abstract

Cybersecurity Awareness: An Introduction for End-Users balances three key elements:

  • an overview of the bad-actors, who they are, how they operate, and why
  • how end-users fulfill their part as the “human firewall” in the larger security effort
  • your specific policies and procedures, and how to follow them

Cybersecurity Awareness: An Introduction for End-Users is a comprehensive seminar centred around a lively lecture, mixed with in-the-news examples, engaging stories, and incorporating audience questions throughout. It can be tailored for employees with any level of technical savvy, or none at all.

From the top to the bottom of your organization, anyone with access to your systems is a potential target for bad-actors to exploit. Have you provided adequate training?

Speaker Abstract

Perry Feler, of FelerNetworks Corporation, has navigated the world of IT, and related security, for almost a quarter-century. Perry’s approach to data security has always placed a strong emphasis on end-user education, bolstering end-users as the critical network infrastructure that they are. Endlessly-patient, and always approachable, Perry is the natural choice for end-user-oriented training.

Speaker Abstract

Perry Feler, of FelerNetworks Corporation, has navigated the world of IT, and related security, for almost a quarter-century. Perry’s approach to data security has always placed a strong emphasis on end-user education, bolstering end-users as the critical network infrastructure that they are. Endlessly-patient, and always approachable, Perry is the natural choice for end-user-oriented training.

Seminar Itinerary

Available as a half- or full-day program, to accommodate your scheduling requirements.

in-advance, optional Discussions with your IT department
specific policies, procedures, screenshots, examples, and company stories to be included in the seminar
9am – 11am, optional Morning Edition (breakfast-catered)
including Q&A throughout, as well as a 15-minute intermission
12pm – 2pm Mid-Day Edition (lunch-catered)
including Q&A throughout, as well as a 15-minute intermission
3pm – 5pm, optional Floating Discussions (one-on-ones)
available for individual discussions and detailed questions, including at staff desks and workstations

Seminars are formatted for small/large classrooms (catering optional), or lecture halls with a display.

Seminar Itinerary

Available as a half- or full-day program, to accommodate your scheduling requirements.

in-advance, optional Discussions with your IT department
specific policies, procedures, screenshots, examples, and company stories to be included in the seminar
9am – 11am, optional Morning Edition (breakfast-catered)
including Q&A throughout, as well as a 15-minute intermission
12pm – 2pm Mid-Day Edition (lunch-catered)
including Q&A throughout, as well as a 15-minute intermission
3pm – 5pm, optional Floating Discussions (one-on-ones)
available for individual discussions and detailed questions, including at staff desks and workstations

Seminars are formatted for small/large classrooms (catering optional), or lecture halls with a display.

Seminar Syllabus

Attendees will receive an overview of the threats present in today’s digital world, specifically those which pass by, or through, the devices that they use every day. Attendees will be given basic skills to help protect the organization, and themselves, from such threats. Throughout, attendees will be guided through your organization’s specific policies and scenarios to ensure that they perform effectively and comfortably on-the-job.

Attendees will learn:

Knowledge

  • Who are the bad-guys, who are their targets, what do they want, and why?
  • What does the IT department secure, and why can’t they protect against everything?
  • The role of end-users as they pertain to data security and information privacy.
  • Types of malware, including viruses & ransomware.
  • The dangers of social-engineering including phishing and spear-phishing.
  • What is the cloud, benefits vs. exposure, “shadow IT” services, and encryption.
  • Public networks, Wi-Fi, security, trust, and best practices.

Skills

  • Attendees will be able to choose appropriate passwords, safely manage multiple sets of credentials, lock workstations, and follow existing IT department policies to keep accounts safe.
  • Attendees will be able to recognize and avoid basic malware, distinguish between real and fake anti-virus alerts, and to know when they should not guess but call IT instead.
  • Attendees will be able to avoid common phishing attacks by revealing/bypassing hyperlinks.
  • Attendees will be able to reduce the risk of social-engineering attacks by knowing when, and how, to question and authenticate an executive’s written instructions.
  • Attendees will know the risks of working off-site, and follow policies accordingly.

Attitudes

  • Attendees will confidently navigate potential threats surrounding their every-day work.
  • Attendees will recognize when they are out of their depth and should ask IT for help.
  • Attendees will have an appreciation for the IT department and the security it provides.
  • Attendees will understand how they could become the weak link in any corporate attack.

Following the seminar, additional assistance will be available to attendees for the remainder of the business day. This is suitable for detailed questions, and one-on-one at-desk discussions.

Seminars tie the lessons learned to steps that end-users can take at home, to protect their families and personal equipment. This is furthered by a take-home-tips handout.

Seminars are modular, and can be formatted to include additional elements, cover custom training, or to exclude inapplicable topics. Interactive discussions are encouraged (subject only to scheduling constraints), with presentation-interrupting questions welcome in classroom settings.

Subsequent seminars can be tailored as refresher courses for annual or quarterly reinforcement.

Seminar Syllabus

Attendees will receive an overview of the threats present in today’s digital world, specifically those which pass by, or through, the devices that they use every day. Attendees will be given basic skills to help protect the organization, and themselves, from such threats. Throughout, attendees will be guided through your organization’s specific policies and scenarios to ensure that they perform effectively and comfortably on-the-job.

Attendees will learn:

Knowledge

  • Who are the bad-guys, who are their targets, what do they want, and why?
  • What does the IT department secure, and why can’t they protect against everything?
  • The role of end-users as they pertain to data security and information privacy.
  • Types of malware, including viruses & ransomware.
  • The dangers of social-engineering including phishing and spear-phishing.
  • What is the cloud, benefits vs. exposure, “shadow IT” services, and encryption.
  • Public networks, Wi-Fi, security, trust, and best practices.

Skills

  • Attendees will be able to choose appropriate passwords, safely manage multiple sets of credentials, lock workstations, and follow existing IT department policies to keep accounts safe.
  • Attendees will be able to recognize and avoid basic malware, distinguish between real and fake anti-virus alerts, and to know when they should not guess but call IT instead.
  • Attendees will be able to avoid common phishing attacks by revealing/bypassing hyperlinks.
  • Attendees will be able to reduce the risk of social-engineering attacks by knowing when, and how, to question and authenticate an executive’s written instructions.
  • Attendees will know the risks of working off-site, and follow policies accordingly.

Attitudes

  • Attendees will confidently navigate potential threats surrounding their every-day work.
  • Attendees will recognize when they are out of their depth and should ask IT for help.
  • Attendees will have an appreciation for the IT department and the security it provides.
  • Attendees will understand how they could become the weak link in any corporate attack.

Following the seminar, additional assistance will be available to attendees for the remainder of the business day. This is suitable for detailed questions, and one-on-one at-desk discussions.

Seminars tie the lessons learned to steps that end-users can take at home, to protect their families and personal equipment. This is furthered by a take-home-tips handout.

Seminars are modular, and can be formatted to include additional elements, cover custom training, or to exclude inapplicable topics. Interactive discussions are encouraged (subject only to scheduling constraints), with presentation-interrupting questions welcome in classroom settings.

Subsequent seminars can be tailored as refresher courses for annual or quarterly reinforcement.

 
Microsoft Partner Seagate AVG Reseller D-Link For Business
Our Approach
All about quality
Superior experience
Big picture thinking
Attention to detail
Clear communication
Education and training
Key benefits
Service Offerings
IT is multi-faceted
Flexible services
Unique approach
Assess
Advise, design and plan
Deploy, install, configure
Manage and maintain
About FelerNetworks
Philosophy
Why we're better
Verticals
Typical customers
Service area
Training Seminars
Cybersecurity Awareness
 
Product Focus
The right tools
 
Home
Contact us

© Copyright 2003 - 2024 FelerNetworks Corporation.
All rights reserved.
All trademarks are the exclusive property of their respective owners.