Information Security Awareness Training

Posted By: ELK1nG

Information Security Awareness Training
Published 9/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.15 GB | Duration: 0h 55m

Empowering Individuals to Protect Digital Assets and Mitigate Risks

What you'll learn

Understand the importance of Information Security to the Organization

Identify common Cyber threats and Vulnerabilities

Recognize Social Engineering tactics such as Phishing, Malware etc.,

Practice safe Password management

Protect sensitive Information both at work and at home

Understand the importance of reporting suspicious activities

Requirements

Basic Computer Literacy: Familiarity with using computers and navigating the internet is essential. Participants should know how to operate basic software applications and understand common online activities.

Analytical Thinking: A capacity for analytical thinking will aid in understanding various cyber threats and the logic behind cybersecurity practices.

Technical Knowledge: While not mandatory, having some foundational technical knowledge can be beneficial. This includes understanding how networks operate and basic concepts of information technology.

Description

Cyber Security Awareness Training: Understanding and Preventing Cyber RisksIn today's interconnected world, where technology has become an integral part of our daily lives, it's crucial for individuals to understand the importance of cybersecurity and how to protect themselves from various online threats. This comprehensive training video aims to empower you with the knowledge and skills necessary to navigate the digital landscape safely and securely. Throughout the course, you will learn fundamental cybersecurity concepts, including key terms, principles, and best practices. You will explore common cyber threats, such as malware, phishing, social engineering, and data breaches, and discover effective strategies for recognizing and mitigating these risks. One of the key focuses of the training is password management. You will learn how to create strong, unique passwords and understand the importance of using password managers to enhance your online security. Additionally, you will explore safe online behavior, including secure browsing habits, email security, and social media privacy settings, to protect your personal information. The training also covers incident response, equipping you with the knowledge to respond effectively in the event of a cybersecurity incident. You will learn about reporting procedures and steps to minimize damage, ensuring that you are prepared to handle potential threats. As technology continues to evolve, staying informed about emerging trends and technologies is crucial. By the end of this training video, you will be equipped with the knowledge and tools necessary to safeguard your digital assets, protect your online privacy, and contribute to a more secure digital ecosystem. Empower yourself and take control of your cybersecurity today!

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Information Security

Lecture 2 What is Information Security

Lecture 3 Pillars of Information Security

Section 3: Information Security Threats

Lecture 4 Information Security Threats - Introduction

Lecture 5 Types of Threats

Lecture 6 External Threats

Lecture 7 - Malware

Lecture 8 - Hacker

Lecture 9 - Phishing Attacks

Lecture 10 - Denial of Services (DoS) Attacks

Lecture 11 - Data Breaches

Lecture 12 Internal Threats

Lecture 13 - Disgruntled Employees

Lecture 14 - Careless Employess

Lecture 15 - Insider Threats

Lecture 16 - Privilege Abuse

Lecture 17 - To Prevent Internal Threats

Lecture 18 Human Threats

Lecture 19 - Social Engineering

Lecture 20 - Phishing

Lecture 21 - Human Error

Lecture 22 - Insider Trading

Lecture 23 Technical Threats

Lecture 24 - Software Bugs

Lecture 25 - Hardware Failures

Lecture 26 - Network Outages

Lecture 27 - System Vulnerabilities

Lecture 28 - Configuration Errors

Lecture 29 - To Prevent Technical Threats

Lecture 30 Environmental Threats

Lecture 31 - Natural Disasters

Lecture 32 - Power Outages

Lecture 33 - Fire Accident

Lecture 34 - Climate change

Lecture 35 - To Prevent Environmental Threats

Section 4: Privacy and Information Security

Lecture 36 Data Privacy and Data Protection

Lecture 37 Data Protection - Breach/Case Study

Section 5: Data Classification

Lecture 38 Classification of Data

Lecture 39 Importance of Data Classification

Section 6: Social Engineering

Lecture 40 Social Engineering

Section 7: Phishing

Lecture 41 Phishing

Section 8: Business Email Compromise

Lecture 42 Business Email Compromise (BEC)

Section 9: Password Attack

Lecture 43 Password Attack

Lecture 44 Additional Measures

Lecture 45 Composing a Strong Password

Section 10: Ransomware

Lecture 46 Ransomware

Section 11: Removable Media

Lecture 47 Removable Media

Section 12: Browser Security

Lecture 48 Browser Security

Lecture 49 To safeguard Browsers

Section 13: Social Media Security

Lecture 50 Social Media Security

Lecture 51 To Protect Social Media Profiles

Section 14: Standards and Frameworks

Lecture 52 Standards and Frameworks - Introduction

Lecture 53 - ISO/IEC 27001:2022

Lecture 54 - NIST

Lecture 55 - GDPR

Lecture 56 - SOC 2

Lecture 57 - BCMS

Lecture 58 - ISO 27701

Section 15: Information Security Management

Lecture 59 Information Security Management

Lecture 60 Information Security Policy

Section 16: Business Continuity Plan and Data Recovery

Lecture 61 Business Continuity Plan (BCP) - Intoduction

Lecture 62 Elements of BCP

Lecture 63 Data Recovery

Section 17: Do's and Don'ts

Lecture 64 Do's and Don'ts

Section 18: Conclusion

Lecture 65 Conclusion

Corporate Employees in Information Technology and those with digital responsibilities in their roles.,People working in roles that involve handling sensitive data or accessing company systems.,Students and Educators, particularly in fields related to IT, business, or any discipline where digital tools are used.,Individuals interested in learning to protect their personal information.,Non-Technical Professionals, who may not from IT but interested in basic cybersecurity principles.