Expertise Level: Beginner to intermediate – no previous knowledge required
|
|
As cyber crime evolves the only effective way to prevent most security breaches is by everyone following best-practices. These come from individual training and ongoing support.
This interactive e-learning course is designed for the particular challenges faced by:
All managers and decision makers in every organisation.
It helps them to:
Improve their personal cyber-security and to work with plans and procedures for reducing cyber security risk in their organisations.
|
|
|
|
Course Content
Day-To-Day Operational Expectations For You & For Others
Topics: Passwords, data protection, mobile devices
-
Data Protection
Understand your responsibilities toward data privacy. Recall data destruction standards. Understand the dangers of leaving private/confidential out in the open.
6min 5sec
-
Mobile Devices
Understand how malware is delivered to your device. Identify multiple ways to protect your device. Demonstrate what to do if your device is lost or stolen.
7min 14sec
-
Passwords
Identify three different cyber attacks that put your passwords at risk. Understand what constitutes a strong password. Effectively manage your passwords. Identify how multi-factor authentication keeps your account safer.
5min 46sec
- Data Protection Understand your responsibilities toward data privacy. Recall data destruction standards. Understand the dangers of leaving private/confidential out in the open. 6min 5sec
- Mobile Devices Understand how malware is delivered to your device. Identify multiple ways to protect your device. Demonstrate what to do if your device is lost or stolen. 7min 14sec
- Passwords Identify three different cyber attacks that put your passwords at risk. Understand what constitutes a strong password. Effectively manage your passwords. Identify how multi-factor authentication keeps your account safer. 5min 46sec
Recognise & Defeat Targeted Attack Strategies
Topics: Spear phishing, BEC scams, insider threats, social engineering.
-
BEC scams
Identify warnings signs of a BEC scam. Differentiate the 3 main types. Prevent yourself from falling for a BEC scam. Report a suspected attack.
6min 30sec
-
Insider Threats
Comprehend the danger insider threats pose. Identify 3 types of Insider Threats. Understand what to do if you observe suspicious activity.
5min 57sec
-
Social Engineering
Tell the difference between a technical and non-technical attack. Identify different types of social engineering. Understand what to do if you are the target of a social engineering scam.
6min 23sec
-
Spear Phishing Awareness
Explain why spear phishing poses a threat to your organisation. Define the three types of spear phishing emails. Identify the indicators of a spear phishing email.
5min 54sec
- BEC scams Identify warnings signs of a BEC scam. Differentiate the 3 main types. Prevent yourself from falling for a BEC scam. Report a suspected attack. 6min 30sec
- Insider Threats Comprehend the danger insider threats pose. Identify 3 types of Insider Threats. Understand what to do if you observe suspicious activity. 5min 57sec
- Social Engineering Tell the difference between a technical and non-technical attack. Identify different types of social engineering. Understand what to do if you are the target of a social engineering scam. 6min 23sec
- Spear Phishing Awareness Explain why spear phishing poses a threat to your organisation. Define the three types of spear phishing emails. Identify the indicators of a spear phishing email. 5min 54sec
Recognise & Defeat The Threats You Experience Daily
Topics: Ransomware, malicious links, malware, surfing the web.
-
Malicious Links
Understand why links can be dangerous. Identify the components of a link. Break down the parts of a URL. Understand what to do if you are targeted.
8min 27sec
-
Malware
Understand what malware is. Identify common varieties of malware. Understand how malware is used. Understand the value and limitations of Antivirus.
7min 2sec
-
Ransomware
Define ransomware. Understand how it is delivered. Comprehend its effect. Minimize the threat of ransomware. Report ransomware attacks.
7min 46sec
-
Surfing The Web
Understand safe web surfing. Identify secure websites. Identify and avoid malicious sites and links.
7min 44sec
- Malicious Links Understand why links can be dangerous. Identify the components of a link. Break down the parts of a URL. Understand what to do if you are targeted. 8min 27sec
- Malware Understand what malware is. Identify common varieties of malware. Understand how malware is used. Understand the value and limitations of Antivirus. 7min 2sec
- Ransomware Define ransomware. Understand how it is delivered. Comprehend its effect. Minimize the threat of ransomware. Report ransomware attacks. 7min 46sec
- Surfing The Web Understand safe web surfing. Identify secure websites. Identify and avoid malicious sites and links. 7min 44sec