{"id":168476,"date":"2023-05-31T17:00:32","date_gmt":"2023-05-31T14:00:32","guid":{"rendered":"https:\/\/trainings.eduhouse.fi\/?post_type=product&#038;p=168476"},"modified":"2026-02-24T14:13:08","modified_gmt":"2026-02-24T12:13:08","slug":"cybersecurity-basics","status":"publish","type":"product","link":"https:\/\/trainings.eduhouse.fi\/en\/koulutukset\/cybersecurity-basics\/","title":{"rendered":"CyberSecurity \u2013 basics"},"content":{"rendered":"<p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Cyber security is an increasingly important topic in both the private and public sector, regardless of the job you do.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">IT security is threatened by both criminal hackers and state-supported actors.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">A company is no stronger than its weakest link when it comes to protecting its data.<\/span><\/span><\/p>\n<h3><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Goal<\/span><\/span><\/h3>\n<p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">The aim of this course is to learn the basics of what cyber security is and to acquire knowledge that makes you better equipped to recognize possible attacks.<\/span><\/span><\/p>\n<h3><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Target audience<\/span><\/span><\/h3>\n<p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">This course is aimed at users who want to learn and understand cyber security, so that they can act in a safe way.<\/span><\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Software version<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<p>No software is used in this training.<\/p>\n<h3><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Content<\/span><\/span><\/h3>\n<h4><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">The world of cyber security<\/span><\/span><\/h4>\n<ul>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Get to know the importance of cyber security and the threat picture we face today<\/span><\/span><\/li>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Methods used in cyber security attacks<\/span><\/span><\/li>\n<\/ul>\n<h4><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Malicious software<\/span><\/span><\/h4>\n<ul>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">What is the malware trying to do?<\/span><\/span><\/li>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">How malware spreads<\/span><\/span><\/li>\n<\/ul>\n<h4><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Phishing and fraud<\/span><\/span><\/h4>\n<ul>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Why usernames, passwords and general user information are stolen<\/span><\/span><\/li>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">How phishing works<\/span><\/span><\/li>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Common fraud methods<\/span><\/span><\/li>\n<\/ul>\n<h4><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">How to protect yourself<\/span><\/span><\/h4>\n<ul>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Basic steps towards enhanced security<\/span><\/span><\/li>\n<li><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Use of memory sticks, passwords and phishing detection<\/span><\/span><\/li>\n<\/ul>\n<h3><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Keywords<\/span><\/span><\/h3>\n<p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Security, Cybersecurity, Hacker, Phishing, Phishing, Viruses, Passwords<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is an increasingly important topic in both the private and public sector, regardless of the job you do. IT security is threatened by both criminal hackers and state-supported actors. A company is no stronger than its weakest link when it comes to protecting its data. Goal The aim of this course is to [&#8230;]\n","protected":false},"featured_media":238390,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false},"product_cat":[1081],"product_tag":[8389,8390,8393,8391,6379,8392],"class_list":{"0":"post-168476","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-scheduled-online-trainings","7":"product_tag-cybersecurity","8":"product_tag-hacker-2","9":"product_tag-passwords","10":"product_tag-phishing-3","11":"product_tag-security-2","12":"product_tag-viruses","14":"first","15":"instock","16":"sold-individually","17":"taxable","18":"shipping-taxable","19":"purchasable","20":"product-type-variable","21":"has-default-attributes"},"acf":[],"_links":{"self":[{"href":"https:\/\/trainings.eduhouse.fi\/en\/wp-json\/wp\/v2\/product\/168476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trainings.eduhouse.fi\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/trainings.eduhouse.fi\/en\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/trainings.eduhouse.fi\/en\/wp-json\/wp\/v2\/comments?post=168476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trainings.eduhouse.fi\/en\/wp-json\/wp\/v2\/media\/238390"}],"wp:attachment":[{"href":"https:\/\/trainings.eduhouse.fi\/en\/wp-json\/wp\/v2\/media?parent=168476"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/trainings.eduhouse.fi\/en\/wp-json\/wp\/v2\/product_cat?post=168476"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/trainings.eduhouse.fi\/en\/wp-json\/wp\/v2\/product_tag?post=168476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}