Expertise Level: Beginner to intermediate – no previous knowledge required
|
|
As cyber crime evolves the only effective way to prevent most security breaches is by everyone following best-practices. These come from individual training and ongoing support.
This interactive e-learning course is designed for the particular challenges faced by:
Consultants, professionals & micro-business owners who are personally responsible for the sensitive data in their organisation.
It helps them to:
Focus on their own cybersecurity and to help in reducing cyber-security risk throughout their operations.
|
|
|
|
Course Content
Threat Awareness For Everyday Events
Topics: Ransomware, malicious links, malware, surfing the web
-
Ransomware
Define ransomware. Understand how it is delivered. Comprehend its effect. Minimize the threat of ransomware. Report ransomware attacks.
7min 46sec
-
Malicious Links
Understand why links can be dangerous. Identify the components of a link. Break down the parts of a URL. Understand what to do if you are targeted.
8min 27sec
-
Malware
Understand what malware is. Identify common varieties of malware. Understand how malware is used. Understand the value and limitations of Antivirus.
7min 2sec
-
Surfing The Web
Understand safe web surfing. Identify secure websites. Identify and avoid malicious sites and links.
7min 44sec
- Ransomware Define ransomware. Understand how it is delivered. Comprehend its effect. Minimize the threat of ransomware. Report ransomware attacks. 7min 46sec
- Malicious Links Understand why links can be dangerous. Identify the components of a link. Break down the parts of a URL. Understand what to do if you are targeted. 8min 27sec
- Malware Understand what malware is. Identify common varieties of malware. Understand how malware is used. Understand the value and limitations of Antivirus. 7min 2sec
- Surfing The Web Understand safe web surfing. Identify secure websites. Identify and avoid malicious sites and links. 7min 44sec
Protecting Customers Data & Your Companies Assets Against Targeted Attacks
Topics: Social engineering, spear phishing, BEC scams.
-
Social Engineering
Tell the difference between a technical and non-technical attack. Identify different types of social engineering. Understand what to do if you are the target of a social engineering scam.
6min 23sec
-
Spear Phishing Awareness
Explain why spear phishing poses a threat to your organisation. Define the three types of spear phishing emails. Identify the indicators of a spear phishing email.
5min 54sec
-
BEC scams
Identify warnings signs of a BEC scam. Differentiate the 3 main types. Prevent yourself from falling for a BEC scam. Report a suspected attack.
6min 30sec
-
Insider Threats
Comprehend the danger insider threats pose. Identify 3 types of Insider Threats. Understand what to do if you observe suspicious activity.
5min 57sec
- Social Engineering Tell the difference between a technical and non-technical attack. Identify different types of social engineering. Understand what to do if you are the target of a social engineering scam. 6min 23sec
- Spear Phishing Awareness Explain why spear phishing poses a threat to your organisation. Define the three types of spear phishing emails. Identify the indicators of a spear phishing email. 5min 54sec
- BEC scams Identify warnings signs of a BEC scam. Differentiate the 3 main types. Prevent yourself from falling for a BEC scam. Report a suspected attack. 6min 30sec
- Insider Threats Comprehend the danger insider threats pose. Identify 3 types of Insider Threats. Understand what to do if you observe suspicious activity. 5min 57sec
Practical Day-To-Day Best Practices For Better Security
Topics: Passwords, data protection, physical security, mobile devices, security outside the office.
-
Passwords
Identify three different cyber attacks that put your passwords at risk. Understand what constitutes a strong password. Effectively manage your passwords. Identify how multi-factor authentication keeps your account safer.
5min 46sec
-
Data Protection
Understand your responsibilities toward data privacy. Recall data destruction standards. Understand the dangers of leaving private/confidential out in the open.
6min 5sec
-
Physical Security
-
Mobile Devices
Understand how malware is delivered to your device. Identify multiple ways to protect your device. Demonstrate what to do if your device is lost or stolen.
7min 14sec
-
Security Outside The Office
Identify attack methods that put your security at risk. Understand the risks of using a portable storage device. Know the difference between a public and a secure network. Know what to do if your device is lost or stolen.
10min 16sec
- Passwords Identify three different cyber attacks that put your passwords at risk. Understand what constitutes a strong password. Effectively manage your passwords. Identify how multi-factor authentication keeps your account safer. 5min 46sec
- Data Protection Understand your responsibilities toward data privacy. Recall data destruction standards. Understand the dangers of leaving private/confidential out in the open. 6min 5sec
- Physical Security
- Mobile Devices Understand how malware is delivered to your device. Identify multiple ways to protect your device. Demonstrate what to do if your device is lost or stolen. 7min 14sec
- Security Outside The Office Identify attack methods that put your security at risk. Understand the risks of using a portable storage device. Know the difference between a public and a secure network. Know what to do if your device is lost or stolen. 10min 16sec