About Cyber Raksha Kavach Program

Centre for Digital Transformation and Microsoft have come together to offer various initiatives on Cyber Security to handhold Indian Small and Medium Enterprises to develop and maintain a strong Cyber Security posture. This is being executed under the aegis of an overall Cyber Raksha Kavach program. As part of this program, we would be offering a series of training programs containing multiple modules to cover all aspects of Cyber Security.


CRK Calendar

  • November
    2022
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • Su
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30

4th November 2022

Cii Cyber security Training – Cyber Raksha Kavach

Register Here

8th November 2022

Cii Cyber security Training – Cyber Raksha Kavach

Register Here

11th November 2022

Cii Cyber security Training – Cyber Raksha Kavach

Register Here

15th November 2022

Cii Cyber security Training – Cyber Raksha Kavach

Register Here

18th November 2022

Cii Cyber security Training – Cyber Raksha Kavach

Register Here

22nd November 2022

Cii Cyber security Training – Cyber Raksha Kavach

Register Here

25th November 2022

Cii Cyber security Training – Cyber Raksha Kavach

Register Here

29th October 2022

Cii Cyber security Training – Cyber Raksha Kavach

Register Here

MODULES

Introduction of CRK

Cyber Security Fundamentals

  • What is Cyber security?
  • Why is Cyber security Important?
  • What is CIA Triad?
  • What is Hacking?

Types of Malware

  • Worms
  • Spyware
  • Trojans
  • Case Study
  • Viruses

Cyber Security Breaches

  • Phishing
  • Identity Theft
  • Harassment
  • Cyberstalking
  • Case Study

Types of Cyber Attacks

  • Password Attacks
  • Denial of Service Attacks
  • Passive Attack
  • Case Study

Cloud Security

  • Intro to cloud
  • Cloud vs on premise
  • Intro to Dark web
  • Case Study

Common Threat Vectors for Businesses

  • Social Media Crimes
  • Email Based Attacks
  • Mobile Based Attacks
  • Case Study

Prevention Tips

  • Craft a Strong Password
  • Two‐Step Verification
  • Download Attachments with Care
  • Question Legitimacy of Websites
  • Case Study

Prevention Software

  • Firewalls
  • Virtual Private Networks
  • Anti‐Virus & Anti‐Spyware
  • Routine Updates
  • Case Study

Data Privacy and Protection

  • Applicable Indian Laws 
  • Other International Laws 
  • Responsibilities and obligations of a company
  • Case Study 

Wrapping Up

  • Recapitulation
  • Action to be taken on Cyber attack
  • Legal Recourse
  • Precautionary measures
  • Importance of Cyber Security Assessment

FEATURES OF THE PROGRAM