Cyber Security Training – Memphis, TN | In-Person & Live Virtual

Tue, 09 Jun, 2026 at 09:00 am to Tue, 09 Mar, 2027 at 05:00 pm UTC-06:00

For venue details reach us at [email protected] | Memphis

AdeptSkil
Publisher/HostAdeptSkil
Cyber Security Training \u2013 Memphis, TN | In-Person & Live Virtual
Advertisement
Protect your data, prevent cyber threats, and stay secure.
About this Event

Course Title

Cyber Security Training

Certificate

Course Completion Certificate – Issued by AdeptSkil

Duration

2 Days (16 Training Hours)

Delivery Mode

Instructor-led Training – Classroom / Live Virtual / In-house

Language

English

Credits

16 Professional Development Credits

Course Overview

In today’s digital world, cyber threats are evolving rapidly, making cybersecurity a critical responsibility for every organization. The ability to protect information systems from unauthorized access, disruption, or theft is essential for maintaining business continuity and trust.

This course equips participants with a strong foundation in cybersecurity concepts, common threats, and practical prevention techniques. Participants will learn how cyberattacks occur, how to identify vulnerabilities, and how to implement effective security measures to safeguard organizational data and systems.

Learning Outcomes

By the end of this course, participants will be able to:

  • Understand key cybersecurity concepts and threats
  • Identify different types of malware and cyberattacks
  • Recognize phishing attempts and security breaches
  • Apply best practices for password and data security
  • Use preventive measures to reduce cyber risks
  • Protect devices, networks, and personal information
  • Understand tools used to secure organizational systems

KEY TOPICS COVERED

Cybersecurity Fundamentals

Understanding digital environments and security importance

Types of Malware

Viruses, worms, spyware, trojans, and their impact

Cyber Security Breaches

Phishing, identity theft, and online threats

Types of Cyber Attacks

DoS attacks, password attacks, and vulnerabilities

Prevention Techniques

Password security, two-factor authentication, safe browsing

Mobile and Personal Security

Protecting devices and sensitive data

Social Network Security

Managing privacy and avoiding identity risks

Security Tools and Software

Firewalls, VPNs, antivirus, and system protection

Critical Cyber Threats

Cyberterrorism, espionage, and global risks

Defense Against Hackers

Cryptography basics, intrusion detection, and response strategies

Who Should Attend

This course is ideal for:

  • Employees across all departments
  • IT and non-technical professionals
  • Managers and team leaders
  • Business owners and entrepreneurs
  • Administrative and support staff
  • Individuals handling sensitive data
  • Anyone looking to improve cybersecurity awareness
  • Corporate organizations and public workshop participants

Certification

Participants who successfully complete the training will receive a
Course Completion Certificate from AdeptSkil

🏢 Corporate & Team Bookings

“Private training sessions can be arranged for organizations at your premises or at our venue, tailored to meet your team’s specific development needs.”

📧 [email protected]

📞 +1 646 624 8608

AdeptSkil delivers professional training solutions to organizations across the USA, Canada, Australia, and international markets.

Corporate Group Discounts

10% discount for registrations of 3–9 participants

15% discount for 10 or more participants



🔹 What’s Included

✔ Instructor-led training
✔ Comprehensive training materials
✔ Practical tools and templates
✔ Interactive exercises and case studies
✔ Certificate of completion
✔ Lunch & Refreshments


🔹 Venue Details
The training will be conducted at a premier professional venue nearby.

Exact venue information will be shared with registered participants prior to the event.



Agenda

🕑: 09:00 AM - 09:15 AM
Registration & Welcome

Info: Participant check-in, introductions, overview of workshop objectives, and networking with fellow professionals.


🕑: 09:15 AM - 10:00 AM
Cybersecurity Fundamentals

Info: • Understanding cyberspace and digital environments
• What is cybersecurity and why it is critical
• Types of hackers: White hat, Grey hat, Black hat
• Importance of protecting organizational data


🕑: 10:00 AM - 10:45 AM
Types of Malware

Info: • Worms and their impact on networks
• Viruses and file corruption
• Spyware and data theft
• Trojans and unauthorized access methods


🕑: 10:45 AM - 11:00 AM
Break
🕑: 11:00 AM - 11:45 AM
Cyber Security Breaches

Info: • Phishing attacks and spoof websites
• Identity theft and data misuse
• Cyberbullying and harassment risks
• Cyberstalking and organizational threats


🕑: 11:45 AM - 12:30 PM
Types of Cyber Attacks

Info: • Password attacks and brute force risks
• Denial of Service (DoS) attacks
• Passive vs active attacks
• Penetration testing and vulnerability assessment


🕑: 12:30 PM - 01:00 PM
Lunch Break
🕑: 01:00 PM - 01:45 PM
Prevention Techniques

Info: • Creating strong and secure passwords
• Two-step verification methods
• Safe handling of email attachments
• Identifying legitimate vs malicious websites


🕑: 01:45 PM - 02:45 PM
Mobile and Personal Security

Info: • Securing smartphones and devices
• Risks of storing sensitive data
• Password management best practices
• Protecting personal and business information


🕑: 02:45 PM - 03:00 PM
Break
🕑: 03:00 PM - 03:30 PM
Social Network Security

Info: • Risks of sharing personal information
• Managing privacy settings
• Avoiding identity theft via social media
• Best practices for online presence


🕑: 03:30 PM - 04:00 PM
Security Tools and Software

Info: • Firewalls (network & host-based)
• Virtual Private Networks (VPNs)
• Anti-virus and anti-spyware solutions
• Importance of regular system updates


🕑: 04:00 PM - 04:30 PM
Critical Cyber Threats

Info: • Cyberterrorism and large-scale attacks
• Cyberwarfare and global risks
• Cyber espionage and data theft
• Impact on industries and infrastructure


🕑: 04:30 PM - 04:45 PM
Defense Against Hackers

Info: • Introduction to cryptography
• Digital forensics basics
• Intrusion detection systems
• Legal considerations and response strategies


🕑: 04:45 PM - 05:00 PM
Wrap-Up and Q&A

Info: The session will conclude with key takeaways, a review of action plans, participant reflections, and an open Q&A to reinforce learning.


Advertisement

Event Venue & Nearby Stays

For venue details reach us at [email protected], Ph No: +1 (646) 624-8608, Memphis, United States

Tickets

USD 1134.39 to USD 1475.82

Icon
Concerts, fests, parties, meetups - all the happenings, one place.

Ask AI if this event suits you:

More Events in Memphis

Nights of Malice
Mon, 08 Jun at 06:00 pm Nights of Malice

Growlers - TN

The GirlBoss Multiple Streams Mastermind
Mon, 08 Jun at 07:00 pm The GirlBoss Multiple Streams Mastermind

Believe More Business & Event Center

Nights of Malice at Growlers
Tue, 09 Jun at 07:00 pm Nights of Malice at Growlers

Growlers

Buckethead at Minglewood Hall
Tue, 09 Jun at 08:00 pm Buckethead at Minglewood Hall

Minglewood Hall

Buckethead
Wed, 10 Jun Buckethead

Minglewood Hall

Munch and Learn: Connections and Contemplations
Wed, 10 Jun at 12:00 pm Munch and Learn: Connections and Contemplations

4339 Park Ave, Memphis, TN, United States, Tennessee 38117

Copy of Tennessee 6th Ecclesiastical Jurisdiction AIM Convention 2026
Wed, 10 Jun at 07:00 pm Copy of Tennessee 6th Ecclesiastical Jurisdiction AIM Convention 2026

229 S Danny Thomas Blvd

Memphis is Happening!

Never miss your favorite happenings again!

Explore Memphis Events