Information Sharing and Analysis Center

Information Sharing and Analysis Center

An international non-profit, solving large problems impacting the connected, digital world on cyber security.

NSD EMPANELED ISAC CERTIFIED

Aviation Cyber Security First Responder

The Aviation Cyber Security First Responder (ACSFR) Is a unique 30 hour program aimed at all aviation Industry

employees. The program brings essential awareness in cybersecurity required for every individual servicing the aviation industry.

Standard Price: ₹10,000 + GST 

Special Offer Price for Students: ₹7500 + GST

Special Prices for Professionals and Corporates: Contact Us

Promotional price valid till 31st October 2023

Fees: INR 10,000 + GST, 32 hours Instructor-led online course.

Course Outcome:

  • Learn to protect sensitive information
  • Prevent being a target of social engineering
  • Defend against Phishing and Whaling attacks
  • Secure your passwords and accounts
  • Protect the organization from Ransomware attacks
  • Prevent cyber-attacks on passengers and other critical airport systems
  • Prevent misconducts with professional ethics at the workplace

Examination

The exam consists of 50 multiple choice questions out of which the candidates need to correctly answer a minimum of 60% questions to clear the exam successfully. The exam is conducted on the last day of the course. If you miss attending the session, you can appear for the exam with the next batch. You get a total of three attempts at no additional cost.

Course Dates

No event found!

Contact Us

Group Captain P Aanand Naidu(retd)

Director - ISAC
+91 97317 45635
Email: pan [at] isacfoundation.org
30+ years of experience in policy and management. Adjunct Professor at NALSAR University of Law, Hyderabad

Program outline

  • Children behaving abnormally online – case studies and lessons
  • Negative relationships online – How it impacts family
  • Social Isolation – offline and online issues
  • Low self-esteem and depression – tracking early signs online
  • The tendency for violence from online activities – how to spot the signs and prevent them
  • Internet Gaming Disorder– identifying addiction and other risks
  • Pedophiles online – How to protect children
  • Addiction – various types and what to do about them
  • Narcotics – Understanding different types of drugs, cryptocurrencies and dark web marketplaces used by teenagers
  • Tech abuse – how to counsel children and parents
  • Bank Frauds / Wallet frauds – how to handle the cases
  • Sextortion, Cyberbullying and other online crimes – how to deal with it
  • Virtual girlfriends – how to tell if the children are involved
  • Cyberchondria – Medical self-diagnosis online and its risks
  • The Deep web – What is it
  • Criminal Propaganda – Steps to prevent it
  • Cyber Espionage and Honey traps
  • Guiding victims affected by cybercrime
  • Tools and techniques to monitor children for online safety effectively
  • Fundamental IT Laws that everyone must know
  • Counseling victims of cybercrimes
  • Interacting and supporting cops and lawyers with cybercrime cases
  • Steps you can take to enhance cybersecurity awareness in schools
  • What is the Cyber Kill Chain?
  • How it happens
  • Impact of a cyber attack – Notable case studies in the Aviation industry
  • Who Is a first responder?
  • Why every role matters?
  • How first responders can prevent
  • potential cyber-attacks?
  • What is a social engineering attack?
  • Various techniques of social engineering
  • Best practices to avoid social engineering attacks
  • What are Phishing attacks?
  • All about fake emails
  • Spear-phishing
  • Clone phishing
  • Whaling – phishing for executives.
  • Smishing and Vishing Attacks.
  • Spotting and preventing phishing attacks
  • What Is malware?
  • Trojan Horses
  • Risk of free programs, games, and unverified software
  • Ransomware attacks.
  • How to prevent malware or ransomware attacks
  • What do to if your system Is compromised
  • Cyber-attacks on Point-of-sale (POS) devices – frauds and challenges.
  • Credit card cloning
  • Attack on Wi-Fi Networks
  • Rogue access points
  • Man-in-the-middle attack.
  • Best practices to protect consumers
  • Checking the security of your passwords
  • Has your account been compromised before?
  • Securing the data on your computer and
  • personal devices.
  • Baseline security for your systems
  • Best practices for responding to emails
  • asking for information
  • Best practices for responding to questions
  • by telephone and In-person
  • Protecting sensitive files and information
  • Dealing with colleagues, vendors, external parties, customers, suppliers, service providers etc.

Complimentary Access to the CPEW Course

This course ‘Professional Ethics at Workplace Plus Program,” by Clean Exit aims to empower the participants to analyze the risks of unethical or illegal behavior triggered by severe circumstances through case studies.

Know More