Cyber Awareness Training
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 509.00 MB | Duration: 0h 46m
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 509.00 MB | Duration: 0h 46m
Learn how to defend yourself from Cyber Attacks
What you'll learn
Cyber Awareness
Phishing Awareness
Identify Cyber Threats
Avoid Cyber Threats
Stay safe online
Protect yourself from cyber crime
Requirements
None
Description
Why you should take this Cyber Awareness Training?Technology can stop a lot of cyber attacks - but not all. You can have the latest cutting edge security systems in place, if your company staff is not cyber aware it's only a matter of time until a breach will happen. Be proactive - not reactiveEvery major breach these days typically starts with Social EngineeringMillions of people are targeted with phishing and spear phishing attacks on a daily basisIt only takes one wrong click or user action to have the whole organization compromised Attackers use Email, Phone calls, Impersonation, Portal Media, QR Codes and other vectors Don’t fall victim and learn how you can protect yourselfThis Cyber Awareness training program educates users on threats and methods hackers use and will help organizations to mitigate risk. I recommend this training to any company employee or contractor using Information Technology as part of their jobs. The cyber security course's online modules take the student through steps to stay secure.Course ModulesBefore starting the training, you will be presented with a little entry quiz to check how Cyber aware you already are. All modules contain a video lesson, a quiz at the end and some useful links. At the end of the training you will have the opportunity to test your acquired knowledge by taking an 18 question exam and you will receive a downloadable cheat sheet with best practices in bullet points based on the training.Module 1: Computer Usage Module 2: Your IdentityModule 3: In and around the Office Module 4: Email Communication Module 5: Portable MediaModule 6: Social MediaModule 7: Using the WebModule 8: Home Computer Usage and Working from Home Module 9: Wireless Security and Mobile DevicesAbout the AuthorMartin is an expert in Cyber Security Veteran with 25 years of experience holding most prestigious certifications. He provides Cyber Security services to government entities and commercials worldwide. Martin is a former IT security trainer to the US military and incredibly highly accredited and experienced ethical hacker! Real-life experience in plain English for non-technical employees - to encourage secure practices and protect your business.What is Social Engineering?Most of the data breaches you read about in the news today start off with an attack vector referred to as Social Engineering. Unsuspecting users are being targeted with phone calls, phishing, spear phishing, portable media and other types of attacks in order to gain access to corporate networks. The majority of IT users have no technical background and are unaware of the techniques and methods hackers use to target them.
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Entry quiz
Section 3: Computer Usage
Lecture 2 Computer Usage
Lecture 3 Useful links
Section 4: Your Identity
Lecture 4 Your Identity
Lecture 5 Useful links
Section 5: In and around the office
Lecture 6 In and around the office
Lecture 7 Useful links
Section 6: Email Communication
Lecture 8 Email Communication
Lecture 9 Useful links
Section 7: Portable Media
Lecture 10 Portable Media
Lecture 11 Useful links
Section 8: Social Media
Lecture 12 Social Media
Lecture 13 Useful links
Section 9: Using the Web
Lecture 14 Using the Web
Lecture 15 Useful links
Section 10: Home Computer Usage and Working from Home
Lecture 16 Home Computer Usage and Working from Home
Lecture 17 Useful links
Section 11: Wireless Security and Mobile Devices
Lecture 18 Wireless Security and Mobile Devices
Lecture 19 Useful links
Section 12: Final Exam
Section 13: Cyber Awareness Cheat Sheet
Lecture 20 Cyber Awareness Cheat Sheet
Any Internet user,Any employee or contractor using information technology,Any individual going online