Password Management

About this Course

Passwords are the first line of defence for information in any form. Data at rest (storage) and data in transit. Best password strength and other key practices evolve over time depending on behaviour and formation of various threats.

Objectives

During this module, the participants will gain an understanding of the following key topics:
•Provide information and guidance on account security;
•Explore the use and benefits of password managers;
•Outline common security issues;
•Creating passwords that are harder to guess and crack;
•How accounts are hacked and ways to reduce your risk; and
•Proper account and password management.

During this module, the participants will gain an understanding of the following key topics:
•Provide information and guidance on account security;
•Explore the use and benefits of password managers;
•Outline common security issues;
•Creating passwords that are harder to guess and crack;
•How accounts are hacked and ways to reduce your risk; and
•Proper account and password management.

Tools Required

Trainer
These tools will be necessary for the trainer
to prepare before conducting the training.

Trainee
These tools will be necessary for the trainee
to have during the training.

•Laptop
•Smartphone
•Projector
•Internet access

•USB flash drive
•Suitable space
•Colored electric tape
•Hands-on guides
•Whiteboard
•Post-it notes (multiple colors)
•Markers (multiple colors)
•Flip-chart paper

•Laptop
•Smartphone

Definitions

Password – A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
Passphrase – A passphrase is a manipulated sequence of words or other text used to control access to a computer system, program, or data.
Password Manager – A password manager is a computer program that allows users to store, generate, and manage their passwords for local applications and Online services. Examples include; Last -Pass Keepassxc, One password, Google Password Manager, etc.
Hacking – Unauthorized access by a third party to a confidential/private computer system or account e.g. Brute force