Information Security Awareness Training
Published 9/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.15 GB | Duration: 0h 55m
Published 9/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.15 GB | Duration: 0h 55m
Empowering Individuals to Protect Digital Assets and Mitigate Risks
What you'll learn
Understand the importance of Information Security to the Organization
Identify common Cyber threats and Vulnerabilities
Recognize Social Engineering tactics such as Phishing, Malware etc.,
Practice safe Password management
Protect sensitive Information both at work and at home
Understand the importance of reporting suspicious activities
Requirements
Basic Computer Literacy: Familiarity with using computers and navigating the internet is essential. Participants should know how to operate basic software applications and understand common online activities.
Analytical Thinking: A capacity for analytical thinking will aid in understanding various cyber threats and the logic behind cybersecurity practices.
Technical Knowledge: While not mandatory, having some foundational technical knowledge can be beneficial. This includes understanding how networks operate and basic concepts of information technology.
Description
Cyber Security Awareness Training: Understanding and Preventing Cyber RisksIn today's interconnected world, where technology has become an integral part of our daily lives, it's crucial for individuals to understand the importance of cybersecurity and how to protect themselves from various online threats. This comprehensive training video aims to empower you with the knowledge and skills necessary to navigate the digital landscape safely and securely. Throughout the course, you will learn fundamental cybersecurity concepts, including key terms, principles, and best practices. You will explore common cyber threats, such as malware, phishing, social engineering, and data breaches, and discover effective strategies for recognizing and mitigating these risks. One of the key focuses of the training is password management. You will learn how to create strong, unique passwords and understand the importance of using password managers to enhance your online security. Additionally, you will explore safe online behavior, including secure browsing habits, email security, and social media privacy settings, to protect your personal information. The training also covers incident response, equipping you with the knowledge to respond effectively in the event of a cybersecurity incident. You will learn about reporting procedures and steps to minimize damage, ensuring that you are prepared to handle potential threats. As technology continues to evolve, staying informed about emerging trends and technologies is crucial. By the end of this training video, you will be equipped with the knowledge and tools necessary to safeguard your digital assets, protect your online privacy, and contribute to a more secure digital ecosystem. Empower yourself and take control of your cybersecurity today!
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Information Security
Lecture 2 What is Information Security
Lecture 3 Pillars of Information Security
Section 3: Information Security Threats
Lecture 4 Information Security Threats - Introduction
Lecture 5 Types of Threats
Lecture 6 External Threats
Lecture 7 - Malware
Lecture 8 - Hacker
Lecture 9 - Phishing Attacks
Lecture 10 - Denial of Services (DoS) Attacks
Lecture 11 - Data Breaches
Lecture 12 Internal Threats
Lecture 13 - Disgruntled Employees
Lecture 14 - Careless Employess
Lecture 15 - Insider Threats
Lecture 16 - Privilege Abuse
Lecture 17 - To Prevent Internal Threats
Lecture 18 Human Threats
Lecture 19 - Social Engineering
Lecture 20 - Phishing
Lecture 21 - Human Error
Lecture 22 - Insider Trading
Lecture 23 Technical Threats
Lecture 24 - Software Bugs
Lecture 25 - Hardware Failures
Lecture 26 - Network Outages
Lecture 27 - System Vulnerabilities
Lecture 28 - Configuration Errors
Lecture 29 - To Prevent Technical Threats
Lecture 30 Environmental Threats
Lecture 31 - Natural Disasters
Lecture 32 - Power Outages
Lecture 33 - Fire Accident
Lecture 34 - Climate change
Lecture 35 - To Prevent Environmental Threats
Section 4: Privacy and Information Security
Lecture 36 Data Privacy and Data Protection
Lecture 37 Data Protection - Breach/Case Study
Section 5: Data Classification
Lecture 38 Classification of Data
Lecture 39 Importance of Data Classification
Section 6: Social Engineering
Lecture 40 Social Engineering
Section 7: Phishing
Lecture 41 Phishing
Section 8: Business Email Compromise
Lecture 42 Business Email Compromise (BEC)
Section 9: Password Attack
Lecture 43 Password Attack
Lecture 44 Additional Measures
Lecture 45 Composing a Strong Password
Section 10: Ransomware
Lecture 46 Ransomware
Section 11: Removable Media
Lecture 47 Removable Media
Section 12: Browser Security
Lecture 48 Browser Security
Lecture 49 To safeguard Browsers
Section 13: Social Media Security
Lecture 50 Social Media Security
Lecture 51 To Protect Social Media Profiles
Section 14: Standards and Frameworks
Lecture 52 Standards and Frameworks - Introduction
Lecture 53 - ISO/IEC 27001:2022
Lecture 54 - NIST
Lecture 55 - GDPR
Lecture 56 - SOC 2
Lecture 57 - BCMS
Lecture 58 - ISO 27701
Section 15: Information Security Management
Lecture 59 Information Security Management
Lecture 60 Information Security Policy
Section 16: Business Continuity Plan and Data Recovery
Lecture 61 Business Continuity Plan (BCP) - Intoduction
Lecture 62 Elements of BCP
Lecture 63 Data Recovery
Section 17: Do's and Don'ts
Lecture 64 Do's and Don'ts
Section 18: Conclusion
Lecture 65 Conclusion
Corporate Employees in Information Technology and those with digital responsibilities in their roles.,People working in roles that involve handling sensitive data or accessing company systems.,Students and Educators, particularly in fields related to IT, business, or any discipline where digital tools are used.,Individuals interested in learning to protect their personal information.,Non-Technical Professionals, who may not from IT but interested in basic cybersecurity principles.