Cyber Awareness Training

Posted By: ELK1nG

Cyber Awareness Training
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 509.00 MB | Duration: 0h 46m

Learn how to defend yourself from Cyber Attacks

What you'll learn

Cyber Awareness

Phishing Awareness

Identify Cyber Threats

Avoid Cyber Threats

Stay safe online

Protect yourself from cyber crime

Requirements

None

Description

Why you should take this Cyber Awareness Training?Technology can stop a lot of cyber attacks - but not all. You can have the latest cutting edge security systems in place, if your company staff is not cyber aware it's only a matter of time until a breach will happen. Be proactive - not reactiveEvery major breach these days typically starts with Social EngineeringMillions of people are targeted with phishing and spear phishing attacks on a daily basisIt only takes one wrong click or user action to have the whole organization compromised Attackers use Email, Phone calls, Impersonation, Portal Media, QR Codes and other vectors Don’t fall victim and learn how you can protect yourselfThis Cyber Awareness training program educates users on threats and methods hackers use and will help organizations to mitigate risk. I recommend this training to any company employee or contractor using Information Technology as part of their jobs. The cyber security course's online modules take the student through  steps to stay secure.Course ModulesBefore starting the training, you will be presented with a little entry quiz to check how Cyber aware you already are. All modules contain a video lesson, a quiz at the end and some useful links. At the end of the training you will have the opportunity to test your acquired knowledge by taking an 18 question exam and you will receive a downloadable cheat sheet with best practices in bullet points based on the training.Module 1: Computer Usage Module 2: Your IdentityModule 3: In and around the Office Module 4: Email Communication Module 5: Portable MediaModule 6: Social MediaModule 7: Using the WebModule 8: Home Computer Usage and Working from Home Module 9: Wireless Security and Mobile DevicesAbout the AuthorMartin is an expert in Cyber Security Veteran with 25 years of experience holding most prestigious certifications. He provides Cyber Security services to government entities and commercials worldwide. Martin is a former IT security trainer to the US military and incredibly highly accredited and experienced ethical hacker! Real-life experience in plain English for non-technical employees - to encourage secure practices and protect your business.What is Social Engineering?Most of the data breaches you read about in the news today start off with an attack vector referred to as Social Engineering. Unsuspecting users are being targeted with phone calls, phishing, spear phishing, portable media and other types of attacks in order to gain access to corporate networks. The majority of IT users have no technical background and are unaware of the techniques and methods hackers use to target them.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Entry quiz

Section 3: Computer Usage

Lecture 2 Computer Usage

Lecture 3 Useful links

Section 4: Your Identity

Lecture 4 Your Identity

Lecture 5 Useful links

Section 5: In and around the office

Lecture 6 In and around the office

Lecture 7 Useful links

Section 6: Email Communication

Lecture 8 Email Communication

Lecture 9 Useful links

Section 7: Portable Media

Lecture 10 Portable Media

Lecture 11 Useful links

Section 8: Social Media

Lecture 12 Social Media

Lecture 13 Useful links

Section 9: Using the Web

Lecture 14 Using the Web

Lecture 15 Useful links

Section 10: Home Computer Usage and Working from Home

Lecture 16 Home Computer Usage and Working from Home

Lecture 17 Useful links

Section 11: Wireless Security and Mobile Devices

Lecture 18 Wireless Security and Mobile Devices

Lecture 19 Useful links

Section 12: Final Exam

Section 13: Cyber Awareness Cheat Sheet

Lecture 20 Cyber Awareness Cheat Sheet

Any Internet user,Any employee or contractor using information technology,Any individual going online