top of page

CFI-802 Cyber Crime Prevention For Home Users

You Are The First Point Of Defense For A Cyber Attack!

 

 

 

Cyber attacks are a global issue that can happen any second of the day. Cybercriminals target children, home users, working adults, business owners, and even the government for political reasons. Cyber Criminals may be an individual or a group of syndicates that attack with an objective in mind, without being detected.

 

Preventive measures for cyber attacks are no longer limited to having the most expensive hardware or the latest software to protect your systems. It starts with you, as the end user, to maintain good cyber hygiene readiness, which is the first step you can take to contribute to a safer cyberspace.

 

During our field investigation, we have come across a couple of cyber attacks that were implemented via a personal thumb drive brought in by an employee. Further investigation revealed that the thumb drive contains a malicious program that “opens a door” for a hacker to access the company’s systems.

 

In this course, the trainer will provide various tips on how you can detect whether someone is hacking your account, and how you can protect your family from falling prey to a cyberattack.

Who should attend?

  • ​​​General Public

Getting there

To be advice

  • Venue depends on number of registered participants.

Topics

  • Introduction

  • What is Cyber Attack?

  • Types of Cyber Attack

  • What are the impacts?

  • Case Studies

  • Tell Tale Signs

  • Consequences

  • Do Not Be Over Sensitive

  • Tips For Home User

  • Singapore Laws

  • Questions & Answers

About The Trainer

Mr. Jeff Anthony is a field investigator and a certified ethical hacker. He has been performing cyber and technology crime investigations for the past 30 years, he was an invited speaker for Cyber Attacks Prevention and Fraud Investigation talks. His contributions were featured in various newspaper and magazines.

​

He had handled financial frauds, insurance frauds, membership frauds, payment card frauds, misconduct, data theft, identity theft, espionage. Some frauds involved multi-billions USD, multiple culprits across few countries. 

​

Jeff handles incident response for cyber attacks and had handled numerous cases such as Ransomware, Man-In-The-Middle (MitM) attack, Sextortion, Cyber Extortions, Data Theft, Web page defacement, APT and zero-day incidents

 

“Play your role and be trained! Together we can combat cyber-criminal and strength the first level of defense!” 

General Refund Policy

  • No postage fees will be refunded.

​

  • If a class is cancelled by DigitalFrauds at any time, participants have the option of rescheduling to another date or receive a full refund of the course fee paid.

​

  • No further monies will be paid for any other expenses the participant has or may incur.

​

  • No refund will be provided for participants who are unable to attend the course.

​

  • If a participant cancels the course, the cost of the course material provided to participant by DigitalFrauds will be deducted from the refund, if any.

​

  • Refund must be applied for in writing by the participant at least three days before the lesson commences.

​

  • If the refund is approved, monies will be returned to the same person making the payment.

bottom of page