Cyber Security

Insights

US Based IT Services Company - A Leading US based procurement intelligence and analytics provider wanted to optimize their business intelligence and threat analyze with lower cost of ownership

Posted: September 2024

Know More
Fleet Management Company - The organization operates a fleet of rigs, boats, and vessels that transport materials, equipment, and personnel. Organization serves offshore oil and gas industry worldwide

Posted: September 2024

Know More
Financial Services Company - A Leading financial services group with presence in all geographies with business such as asset management, strategic private equity investment, arbitrage, investment banking

Posted: September 2024

Know More

Expose Hidden Threats and Uncover Weaknesses with a Red Teaming Assessment

Accel’s Red Teaming Assessment takes a comprehensive approach to uncover and address hidden vulnerabilities. Each phase mirrors real-world cyber-attack tactics to ensure your defences are thoroughly tested and fortified. Our Phase wise approach will

Cybersecurity Awareness Program

In today’s digital age, cyber fraud is a growing concern as cybercriminals constantly evolve tactics to bypass security measures and target unsuspecting users.

The goal of this training program is to raise awareness about common cyber fraud tactics, empower users to recognize potential threats, and equip them with strategies to protect themselves and their organizations. By understanding how cyber fraud works and adopting safe online practices, individuals can play a critical role in safeguarding sensitive information and reducing the risk of falling victim to digital scams.

  1. Objective:
  • To educate employees and stakeholders on cybersecurity best practices.
  • To enhance understanding of potential threats and how to mitigate them.
  • To create a security-conscious culture within Organization.
  1. Program Structure:

Module 1: Introduction to Cybersecurity

  • Objective: Build foundational knowledge on cybersecurity.
  • Topics Covered:
  • What is cybersecurity?
  • Why cybersecurity matters to the organization.
  • Overview of common cybersecurity threats.
  • Format: Interactive lecture with Q&A.
  • Duration: 1 hour.

Module 2: Recognizing and Avoiding Phishing Attacks

  • Objective: Educating employees to identify phishing emails and other social engineering attacks.
  • Topics Covered:
    • Types of phishing attacks
    • Spotting suspicious links and attachments.
    • Reporting phishing attempts.
  • Format: Hands-on workshop with examples of real phishing attempts.
  • Duration: 1 hour.

Module 3: Password Management and Multi-Factor Authentication (MFA)

  • Objective: Promoting strong password hygiene and secure authentication methods.
  • Topics Covered:
    • Creating and maintaining strong passwords.
    • Using password managers securely.
    • Understanding and enabling multi-factor authentication.
  • Format: Interactive session with a practical demonstration on setting up MFA.
  • Duration: 45 minutes.

Module 4: Safe Internet and Email Usage

  • Objective: Encourage secure browsing and email practices.
  • Topics Covered:
    • Identifying secure websites and avoiding unsafe links.
    • Handling sensitive information over email.
    • Avoiding malicious downloads and links.
  • Format: Video-based module followed by a Q&A session.
  • Duration: 45 minutes.

Module 5: Data Protection and Privacy

  • Objective: Educating the importance of data privacy and regulatory compliance.
  • Topics Covered:
    • Understanding data sensitivity and classification.
    • Secure data handling practices.
    • Overview of privacy regulations (e.g., GDPR, DPDP Act).
  • Format: Case-study-based workshop.
  • Duration: 1 hour.

Module 6: Mobile Device Security

  • Objective: Providing secure practices for mobile devices used for work.
  • Topics Covered:
    • Securing mobile devices (PINs, screen locks, remote wipe).
    • Risks of public Wi-Fi and use of VPNs.
    • Preventing mobile malware.
  • Format: Lecture with practical examples.
  • Duration: 45 minutes.

Module 7: Social Engineering Awareness

  • Objective: Explain and prevent common social engineering tactics.
  • Topics Covered:
    • Recognizing social engineering red flags.
    • Protecting sensitive information from social engineers.
    • Reporting suspicious interactions.
  • Format: Role-playing exercises and discussions.
  • Duration: 1 hour.

Module 8: Incident Reporting and Response

  • Objective: Outline incident response steps and reporting mechanisms.
  • Topics Covered:
    • Recognizing security incidents.
    • Reporting protocol for suspected breaches or issues.
    • Internal tools and contacts for reporting incidents.
  • Format: Scenario-based training.
  • Duration: 1 hour.

3. Delivery Format

  • Hybrid Model: Combining online modules, in-person workshops, and self-paced e-learning.
  • Frequency: Quarterly sessions for new topics, with annual refreshers.
  • Tracking and Assessment: Regular quizzes, completion tracking, and quarterly feedback collection. 

4. Customization

  • Role-based Training: Customize modules based on role sensitivity (e.g., IT, HR, Finance).
  • Sector-specific Threats: Include case studies and examples relevant to Accel’s industry focus.

5. Metrics and Follow-up

  • Assessments: Conduct pre-and post-training assessments to measure understanding.
  • Feedback Loop: Collect participant feedback for continuous improvement.
  • Metrics: Track incident reporting trends, phishing test click rates, and security metrics post-training.

Training

PG Program in Cyber Security

  1. Introduction:

Accel Limited avails an opportunity to engineering graduates to be a part of Accel IT Services division through its unique skilling and hiring program.

Accel IT Services is looking for fresh engineering graduates to work as a trainee – Cyber Security Analyst for its Global Operation.

  1. Program Eligibility:
    1. B-Tech/B.E (CSE,IT,ECE,EEE), passing year after 2015, with or without experience.
    2. 60% & above marks in the graduation/State Board/Diploma.
    3. Valid address proof (Aadhar/Voter/Passport etc.)
  2. Program Details:

Module 1: Introduction to Cyber security

Module 2: Vulnerabilities and threats

Module 3: Security Appliances

Module 4: Threats & Vulnerabilities Assessment

Module 5: SOC/SIEM/Incident Response

  1. Program Duration:

Total 6 months training

  1. 3 months classroom training (4hrs per day & 5 days in a week)
  2. 3 months on the job training in SOC

Program Topics

  1. Vulnerabilities and Threats
  2. Security Appliances
  3. Introduction to Cyber Security
  4. Threats & Vulnerability Assessment
  5. Security Information & Event Management (SIEM)
    • AT & T SIEM
  1. Incident Response Plan
    • Preparation, Detection and Analysis, Containment, Eradication, Recovery, Lessons learned
    • Case Study
    • Incident response & Handling Steps
    • Incident Management
    • Incident Response Team
  2. Digital Forensics