Cyber Security Training – Memphis, TN | In-Person & Live Virtual

Schedule

Tue, 09 Jun, 2026 at 09:00 am to Tue, 09 Mar, 2027 at 05:00 pm

UTC-06:00

Location

For venue details reach us at [email protected] | Memphis, TN

Advertisement
Protect your data, prevent cyber threats, and stay secure.
About this Event

Course Title

Cyber Security Training

Certificate

Course Completion Certificate – Issued by AdeptSkil

Duration

2 Days (16 Training Hours)

Delivery Mode

Instructor-led Training – Classroom / Live Virtual / In-house

Language

English

Credits

16 Professional Development Credits

Course Overview

In today’s digital world, cyber threats are evolving rapidly, making cybersecurity a critical responsibility for every organization. The ability to protect information systems from unauthorized access, disruption, or theft is essential for maintaining business continuity and trust.

This course equips participants with a strong foundation in cybersecurity concepts, common threats, and practical prevention techniques. Participants will learn how cyberattacks occur, how to identify vulnerabilities, and how to implement effective security measures to safeguard organizational data and systems.

Learning Outcomes

By the end of this course, participants will be able to:

  • Understand key cybersecurity concepts and threats
  • Identify different types of malware and cyberattacks
  • Recognize phishing attempts and security breaches
  • Apply best practices for password and data security
  • Use preventive measures to reduce cyber risks
  • Protect devices, networks, and personal information
  • Understand tools used to secure organizational systems

KEY TOPICS COVERED

Cybersecurity Fundamentals

Understanding digital environments and security importance

Types of Malware

Viruses, worms, spyware, trojans, and their impact

Cyber Security Breaches

Phishing, identity theft, and online threats

Types of Cyber Attacks

DoS attacks, password attacks, and vulnerabilities

Prevention Techniques

Password security, two-factor authentication, safe browsing

Mobile and Personal Security

Protecting devices and sensitive data

Social Network Security

Managing privacy and avoiding identity risks

Security Tools and Software

Firewalls, VPNs, antivirus, and system protection

Critical Cyber Threats

Cyberterrorism, espionage, and global risks

Defense Against Hackers

Cryptography basics, intrusion detection, and response strategies

Who Should Attend

This course is ideal for:

  • Employees across all departments
  • IT and non-technical professionals
  • Managers and team leaders
  • Business owners and entrepreneurs
  • Administrative and support staff
  • Individuals handling sensitive data
  • Anyone looking to improve cybersecurity awareness
  • Corporate organizations and public workshop participants

Certification

Participants who successfully complete the training will receive a
Course Completion Certificate from AdeptSkil

🏢 Corporate & Team Bookings

“Private training sessions can be arranged for organizations at your premises or at our venue, tailored to meet your team’s specific development needs.”

📧 [email protected]

📞 +1 646 624 8608

AdeptSkil delivers professional training solutions to organizations across the USA, Canada, Australia, and international markets.

Corporate Group Discounts

10% discount for registrations of 3–9 participants

15% discount for 10 or more participants



🔹 What’s Included

✔ Instructor-led training
✔ Comprehensive training materials
✔ Practical tools and templates
✔ Interactive exercises and case studies
✔ Certificate of completion
✔ Lunch & Refreshments


🔹 Venue Details
The training will be conducted at a premier professional venue nearby.

Exact venue information will be shared with registered participants prior to the event.



Agenda

🕑: 09:00 AM - 09:15 AM
Registration & Welcome

Info: Participant check-in, introductions, overview of workshop objectives, and networking with fellow professionals.


🕑: 09:15 AM - 10:00 AM
Cybersecurity Fundamentals

Info: • Understanding cyberspace and digital environments
• What is cybersecurity and why it is critical
• Types of hackers: White hat, Grey hat, Black hat
• Importance of protecting organizational data


🕑: 10:00 AM - 10:45 AM
Types of Malware

Info: • Worms and their impact on networks
• Viruses and file corruption
• Spyware and data theft
• Trojans and unauthorized access methods


🕑: 10:45 AM - 11:00 AM
Break
🕑: 11:00 AM - 11:45 AM
Cyber Security Breaches

Info: • Phishing attacks and spoof websites
• Identity theft and data misuse
• Cyberbullying and harassment risks
• Cyberstalking and organizational threats


🕑: 11:45 AM - 12:30 PM
Types of Cyber Attacks

Info: • Password attacks and brute force risks
• Denial of Service (DoS) attacks
• Passive vs active attacks
• Penetration testing and vulnerability assessment


🕑: 12:30 PM - 01:00 PM
Lunch Break
🕑: 01:00 PM - 01:45 PM
Prevention Techniques

Info: • Creating strong and secure passwords
• Two-step verification methods
• Safe handling of email attachments
• Identifying legitimate vs malicious websites


🕑: 01:45 PM - 02:45 PM
Mobile and Personal Security

Info: • Securing smartphones and devices
• Risks of storing sensitive data
• Password management best practices
• Protecting personal and business information


🕑: 02:45 PM - 03:00 PM
Break
🕑: 03:00 PM - 03:30 PM
Social Network Security

Info: • Risks of sharing personal information
• Managing privacy settings
• Avoiding identity theft via social media
• Best practices for online presence


🕑: 03:30 PM - 04:00 PM
Security Tools and Software

Info: • Firewalls (network & host-based)
• Virtual Private Networks (VPNs)
• Anti-virus and anti-spyware solutions
• Importance of regular system updates


🕑: 04:00 PM - 04:30 PM
Critical Cyber Threats

Info: • Cyberterrorism and large-scale attacks
• Cyberwarfare and global risks
• Cyber espionage and data theft
• Impact on industries and infrastructure


🕑: 04:30 PM - 04:45 PM
Defense Against Hackers

Info: • Introduction to cryptography
• Digital forensics basics
• Intrusion detection systems
• Legal considerations and response strategies


🕑: 04:45 PM - 05:00 PM
Wrap-Up and Q&A

Info: The session will conclude with key takeaways, a review of action plans, participant reflections, and an open Q&A to reinforce learning.


Advertisement

Where is it happening?

For venue details reach us at [email protected], Ph No: +1 (646) 624-8608, Memphis, United States

Event Location & Nearby Stays:

Tickets

USD 1134.39 to USD 1475.82

Icon
Know what’s Happening Next — before everyone else does.
AdeptSkil

Host or Publisher AdeptSkil

Ask AI if this event suits you:

Discover More Events in Memphis

Nights of Malice at Growlers
Tue, 09 Jun Nights of Malice at Growlers

Growlers

TRIPS-ADVENTURES
Buckethead at Minglewood Hall
Tue, 09 Jun at 08:00 pm Buckethead at Minglewood Hall

Minglewood Hall

TRIPS-ADVENTURES
Buckethead
Wed, 10 Jun Buckethead

Minglewood Hall

Munch and Learn: Connections and Contemplations
Wed, 10 Jun at 12:00 pm Munch and Learn: Connections and Contemplations

4339 Park Ave, Memphis, TN, United States, Tennessee 38117

ART FINE-ARTS
BYTE SIZE CLASS: Data Engineering & AI: From Data to Deployment
Wed, 10 Jun at 06:00 pm BYTE SIZE CLASS: Data Engineering & AI: From Data to Deployment

CodeCrew HQ

WORKSHOPS IT
Copy of Tennessee 6th Ecclesiastical Jurisdiction AIM Convention 2026
Wed, 10 Jun at 07:00 pm Copy of Tennessee 6th Ecclesiastical Jurisdiction AIM Convention 2026

229 S Danny Thomas Blvd

Cyber Security Overview 1 Day Workshop | Memphis, TN
Fri, 09 Jan at 09:00 am Cyber Security Overview 1 Day Workshop | Memphis, TN

For venue details reach us at [email protected]

WORKSHOPS BUSINESS
CISSP Training Program \u2013 Become a Cybersecurity Leader in Memphis, TN
Mon, 02 Feb at 09:00 am CISSP Training Program – Become a Cybersecurity Leader in Memphis, TN

5100 Poplar Ave

WORKSHOPS IT
CISSP Training Program \u2013 Become a Cybersecurity Leader in Tupelo, MS
Mon, 02 Feb at 09:00 am CISSP Training Program – Become a Cybersecurity Leader in Tupelo, MS

8295 Tournament Dr

WORKSHOPS IT
CISSP Training Program Become a Cybersecurity Leader in Jonesboro, AR
Mon, 02 Feb at 09:00 am CISSP Training Program Become a Cybersecurity Leader in Jonesboro, AR

107 S Main St

WORKSHOPS IT
CISSP Certification | ISC\u00b2 Exam Preparation Program in Jonesboro, AR
Mon, 09 Feb at 09:00 am CISSP Certification | ISC² Exam Preparation Program in Jonesboro, AR

107 S Main St

WORKSHOPS IT
CISSP Certification | ISC\u00b2 Exam Preparation Program in Memphis, TN
Mon, 09 Feb at 09:00 am CISSP Certification | ISC² Exam Preparation Program in Memphis, TN

5100 Poplar Ave

WORKSHOPS IT
CISSP Certification Weekend Training Course in  Jonesboro, AR
Sat, 14 Feb at 09:00 am CISSP Certification Weekend Training Course in Jonesboro, AR

107 S Main St

WORKSHOPS
CISSP Certification Weekend Training Course in Tupelo, MS
Sat, 14 Feb at 09:00 am CISSP Certification Weekend Training Course in Tupelo, MS

8295 Tournament Dr

WORKSHOPS IT
CISSP Certification Weekend Training Course in Memphis, TN
Sat, 14 Feb at 09:00 pm CISSP Certification Weekend Training Course in Memphis, TN

5100 Poplar Ave

WORKSHOPS IT
Ethical Hacking (CEH) Course Weekend Training in Tubac, AZ
Sat, 04 Apr at 09:00 am Ethical Hacking (CEH) Course Weekend Training in Tubac, AZ

8295 Tournament Dr

WORKSHOPS IT
Certified Ethical Hacker \u2013 Practical Ethical Hacker in Jonesboro, AR
Tue, 14 Apr at 09:00 am Certified Ethical Hacker – Practical Ethical Hacker in Jonesboro, AR

107 S Main St

WORKSHOPS
CEH Certification Weekend Training Course in Jonesboro, AR
Sat, 18 Apr at 09:00 am CEH Certification Weekend Training Course in Jonesboro, AR

107 S Main St

WORKSHOPS
FREE!  Explore Software Development: Capture the Flag
Thu, 23 Apr at 05:30 pm FREE! Explore Software Development: Capture the Flag

CodeCrew HQ

WORKSHOPS CONTESTS
Certified Ethical Hacker \u2013 Practical Ethical Hacker in Memphis, TN
Tue, 28 Apr at 09:00 am Certified Ethical Hacker – Practical Ethical Hacker in Memphis, TN

5100 Poplar Ave

WORKSHOPS IT

What's Happening Next in Memphis?

Discover Memphis Events