Description
Why you should take this Cyber Awareness Training?
Technology can stop a lot of cyber attacks – but not all. You can have the latest cutting edge security systems in place, if your company staff is not cyber aware it’s only a matter of time until a breach will happen. Be proactive – not reactive
-
Every major breach these days typically starts with Social Engineering
-
Millions of people are targeted with phishing and spear phishing attacks on a daily basis
-
It only takes one wrong click or user action to have the whole organization compromised
-
Attackers use Email, Phone calls, Impersonation, Portal Media, QR Codes and other vectors
-
Don’t fall victim and learn how you can protect yourself
This Cyber Awareness training program educates users on threats and methods hackers use and will help organizations to mitigate risk. I recommend this training to any company employee or contractor using Information Technology as part of their jobs. The cyber security course’s online modules take the student through steps to stay secure.
Course Modules
Before starting the training, you will be presented with a little entry quiz to check how Cyber aware you already are. All modules contain a video lesson, a quiz at the end and some useful links. At the end of the training you will have the opportunity to test your acquired knowledge by taking an 18 question exam and you will receive a downloadable cheat sheet with best practices in bullet points based on the training.
Module 1: Computer Usage
Module 2: Your Identity
Module 3: In and around the Office
Module 4: Email Communication
Module 5: Portable Media
Module 6: Social Media
Module 7: Using the Web
Module 8: Home Computer Usage and Working from Home
Module 9: Wireless Security and Mobile Devices
About the Author
Martin is an expert in Cyber Security Veteran with 25 years of experience holding most prestigious certifications. He provides Cyber Security services to government entities and commercials worldwide. Martin is a former IT security trainer to the US military and incredibly highly accredited and experienced ethical hacker! Real-life experience in plain English for non-technical employees – to encourage secure practices and protect your business.
What is Social Engineering?
Most of the data breaches you read about in the news today start off with an attack vector referred to as Social Engineering. Unsuspecting users are being targeted with phone calls, phishing, spear phishing, portable media and other types of attacks in order to gain access to corporate networks. The majority of IT users have no technical background and are unaware of the techniques and methods hackers use to target them.
If the coupon is not opening, disable Adblock, or try another browser.