Expertise Level: Beginner to intermediate – no previous knowledge required
|
|
As cyber crime evolves the only effective way to prevent most security breaches is by everyone following best-practices. These come from individual training and ongoing support.
This interactive e-learning course is designed for the particular challenges faced by:
Company owners, directors and other policy makers
It helps them to:
Increase their personal cyber-security, and most essentially helps them to formulate plans and strategies for reducing cyber-security risk throughout their organisations.
|
|
|
|
Course Content
Avoiding The Threats You’ll Meet Everyday
Topics: Ransomware, surfing the web.
-
Data Protection
Understand your responsibilities toward data privacy. Recall data destruction standards. Understand the dangers of leaving private/confidential out in the open.
6min 5sec
-
Passwords
Identify three different cyber attacks that put your passwords at risk. Understand what constitutes a strong password. Effectively manage your passwords. Identify how multi-factor authentication keeps your account safer.
5min 46sec
-
Physical Security
-
Security Outside The Office
Identify attack methods that put your security at risk. Understand the risks of using a portable storage device. Know the difference between a public and a secure network. Know what to do if your device is lost or stolen.
10min 16sec
- Data Protection Understand your responsibilities toward data privacy. Recall data destruction standards. Understand the dangers of leaving private/confidential out in the open. 6min 5sec
- Passwords Identify three different cyber attacks that put your passwords at risk. Understand what constitutes a strong password. Effectively manage your passwords. Identify how multi-factor authentication keeps your account safer. 5min 46sec
- Physical Security
- Security Outside The Office Identify attack methods that put your security at risk. Understand the risks of using a portable storage device. Know the difference between a public and a secure network. Know what to do if your device is lost or stolen. 10min 16sec
Day-To-Day Best Practices For A Secure Organisation
Topics: passwords, data protection, physical security, security outside the office.
-
BEC scams
Identify warnings signs of a BEC scam. Differentiate the 3 main types. Prevent yourself from falling for a BEC scam. Report a suspected attack.
6min 30sec
-
Insider Threats
Comprehend the danger insider threats pose. Identify 3 types of Insider Threats. Understand what to do if you observe suspicious activity.
5min 57sec
-
Spear Phishing Awareness
Explain why spear phishing poses a threat to your organisation. Define the three types of spear phishing emails. Identify the indicators of a spear phishing email.
5min 54sec
- BEC scams Identify warnings signs of a BEC scam. Differentiate the 3 main types. Prevent yourself from falling for a BEC scam. Report a suspected attack. 6min 30sec
- Insider Threats Comprehend the danger insider threats pose. Identify 3 types of Insider Threats. Understand what to do if you observe suspicious activity. 5min 57sec
- Spear Phishing Awareness Explain why spear phishing poses a threat to your organisation. Define the three types of spear phishing emails. Identify the indicators of a spear phishing email. 5min 54sec