Course Details

Parents

Parents

Members' Expected Outcomes:

  • Identify the different forms of viruses and how they work
  • Identify the different ways to extort sons electronically
  • Identify the different forms of penetrations
  • Know the necessary security measures taken to protect children
  • Use of special applications to track children and directing them

Duration:

  • 2 days

Related Course

course outline

The Need for Training

  • Recent studies have shown that young people are the most vulnerable category of cybercrime attacks, where some recent studies have indicated that 80% of which have been subjected to attacks are under the age of 15 years.
  • And more than 18% of children who have been subjected to harassment, may have been subjected via the Internet
  • Our society has become threatened by many dangers, especially moral threat that exploits this category teenage tempting them a lot of porn sites, and intellectual ideas which broadcasts poisoned aiming to sabotage the safe communities.
  • Therefore, it was necessary to rehabilitate the parents in the field of computer security through training on special applications to help protect them from the bad use of this accelerated electronic revolution.

Requirements

  • It is not necessary for members to be excellent with computer system.

Targeted Categories

  • Parents

Register this course to increase your information

Register

Copyright 2022 Security Circles. Developed By Enad abuzaid