{"version":"1.0","provider_name":"THE AI SCHOOL","provider_url":"https:\/\/theaischool.co\/ph","author_name":"deepak","author_url":"https:\/\/theaischool.co\/ph\/author\/deepak\/","title":"Cyber Security Fundamentals - THE AI SCHOOL","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Iw2CeQWOjf\"><a href=\"https:\/\/theaischool.co\/ph\/wpeducation\/cyber-security-fundamentals\/\">Cyber Security Fundamentals<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/theaischool.co\/ph\/wpeducation\/cyber-security-fundamentals\/embed\/#?secret=Iw2CeQWOjf\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Security Fundamentals&#8221; &#8212; THE AI SCHOOL\" data-secret=\"Iw2CeQWOjf\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/theaischool.co\/ph\/wp-content\/uploads\/2024\/12\/11-1.png","thumbnail_width":769,"thumbnail_height":417,"description":"Register Workshop Overview: Cybersecurity Fundamentals Cybersecurity is a critical field that protects individuals, businesses, and organizations from digital threats. This workshop provides an introduction to the core concepts, practices, and tools used in cybersecurity. Participants will learn how to identify potential risks, protect sensitive data, and understand the importance of security protocols in today&#8217;s digital age. The session will blend theory with practical exercises, empowering participants to adopt best practices and safeguard against common cyber threats. Curriculum by Industry Expert Mentors are Tech leads 80% Hand on Workshop Skill Level Beginner to Advance Certification of Completion Tools Tools you master What will you learn Introduction to Cybersecurity Understanding cybersecurity and its importance. Key concepts: threats, vulnerabilities, and risks. Overview of cyber attacks: phishing, malware, ransomware, and denial of service (DoS). Basics of Network Security Introduction to networks and their components. Understanding firewalls, VPNs, and secure protocols (HTTPS, SSL\/TLS). Identifying common network vulnerabilities. Securing Devices and Endpoints Best practices for protecting personal and professional devices. Importance of antivirus software and endpoint protection tools. Managing mobile device security. Data Protection and Privacy Principles of data security: encryption, backup, and secure storage. Understanding GDPR, HIPAA, and other data privacy regulations. Avoiding social engineering attacks and protecting sensitive information. Cyber Threat Identification and Prevention Spotting phishing emails, fake websites, and other scams. Recognizing signs of a compromised system. Steps to mitigate threats in real-time. Ethical and Legal Aspects of Cybersecurity Ethical responsibilities in cybersecurity. Overview of laws and regulations related to cybersecurity. Importance of ethical hacking and penetration testing. Whom will you learn from ? Improve Your Personal \/ Professional Growth With Our GenAI Courses &nbsp; Your Certificate is Awaiting Industry-recognized certification Our certification in Cybersecurity Fundamentals showcases your expertise in protecting digital assets and securing networks. It\u2019s the key to unlocking career opportunities in cybersecurity across industries. Effortless Sharing of Your Achievement Showcase your certification with ease! Share it on LinkedIn, your portfolio, or directly with employers to demonstrate your readiness for AI-driven roles in the workforce. Boost Your Professional Productivity Master advanced cybersecurity tools to protect systems, detect threats, and enhance security protocols. Unlock your potential to safeguard digital assets and drive innovation in any cybersecurity role. FAQ&#8217;s What is a workshop? A workshop is an online training session where participants can join from anywhere via the internet. It provides interactive sessions, presentations, and discussions in a virtual environment. How do I join a workshop? After registering, you will receive an email with a link and instructions to access the workshop. You\u2019ll need a stable internet connection, a device (laptop or smartphone), and possibly a headset for the best experience. Will I get a certificate for attending? Yes, participants who complete the workshop and meet any specified criteria will receive a certificate of participation. Can I interact with the instructor during the workshop? Absolutely! Our workshops are interactive, allowing participants to ask questions and participate in discussions through chat or video\/audio during designated Q&amp;A sessions. What if I miss the live session? If you miss the live session, a recording of the workshop will be available for a limited time. You can access it through your account on our website."}