categories: Technology, Science & Productivity
Level: General
Course Language: Arabic
Learn about the importance of information security in protecting sensitive data and personal information, as well as the challenges that banks face in this field, such as data breaches and cyber threats.
Identify the various types of breaches and cyberattacks, and learn how to assess these risks and methods to protect data from breaches.
Explore the key controls in information security, including technical, administrative, and organizational controls, and how they can be applied to safeguard banking institutions from threats.
Understand how to protect Personally Identifiable Information (PII) and sensitive data within the banking system, how to classify data, and implement the appropriate controls based on its sensitivity level.
Learn about the latest trends in cyberattacks, such as social engineering, voice phishing, and email fraud, and understand best practices for choosing secure passwords and using advanced protection techniques.
Understand the Egyptian cybersecurity laws and regulations and how to comply with them.
Free lessons
Equifax Data Breach - 2017
Smishing, Phishing, and Vishing
Types of Attacks
1. Introduction
Course Introduction
Course Description
2. Information Security Overview
Importance & Challenges of Information Security and Data Breach
Threats, Vulnerabilities, and Risks
Types of Information Security Controls
Types of Attacks
3. Data Security
Data vs. Information
PII and Sensitive Data
Data States
Data Security
Data Classification
CBE Regulations and Egyptian Data Privacy Laws
4. Secure Your Bank
Social Engineering
Email and Internet Security
Smishing, Phishing, and Vishing
Password Best Practices
Latest Attack Trends
Physical Security
Incident Reporting and Whistle Blowing
5. Real World Scenarios
Equifax Data Breach - 2017
WannaCry Ransomware - 2017
Twitter Bitcoin Scam - 2020
SolarWinds - 2020
Colonial Pipeline Ransomware - 2021
Facebook and Google Business Email Scam 2013-2015
Dream Job 2019 - Ongoing
QBOT BEC
6. Conclusion
Course Wrap Up
Data and information security is one of the top priorities for banks and financial institutions. With the increasing number of cyber threats and constant attacks on financial systems, it's no longer just about protecting computers or networks; it's about safeguarding customer data, funds, the reputation of institutions, and their future. Thatâs why the course "Bankerâs Guide to Information Security" has been specifically designed to equip bankers, information security specialists, and managers with the knowledge and skills needed to combat various types of breaches and address the challenges and threats to information security in banks. The course begins with an introduction to the basics of information security and how banks and database systems can be compromised. We will discuss the types of cyber breaches, threats, security vulnerabilities, and how to effectively assess and manage risks. You will also learn to differentiate between data and information, classify data based on its sensitivity, and handle personal data in accordance with the Central Bank of Egypt regulations and Egyptian privacy laws. We will cover methods of protection against breaches and teach you how to safeguard your institution from threats like social engineering, cyber fraud, and the latest trends in cyberattacks. You'll also learn best practices for selecting secure passwords and reporting security incidents. The course delves into critical and real-world issues such as ransomware attacks, email and SMS fraud, as well as reviewing notable breaches like the Equifax data breach and the SolarWinds attack. If you are looking to protect your institution from growing digital risks and aspire to be part of the firewall that ensures the security and safety of banking data, this course is your first step towards achieving that goal. Join us to equip yourself with the tools and knowledge necessary to confront any security threat or breach.
There are no requirements for this course. Your interest in the topic and your commitment to learning are all you need to achieve the utmost benefit from this course.
Head of Information Security Threat Intelligence and Monitoring
33 Learners
1 Course