Role Based Information Security Awareness Training

Posted By: ELK1nG

Role Based Information Security Awareness Training
Published 3/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.79 GB | Duration: 1h 33m

General users & role specific scenarios of cyber risks

What you'll learn

Identify common security threats and attacks that can impact your organization and recognize the signs of a potential security breach.

Understand the importance of role-based security and the specific responsibilities and best practices for your job function to maintain a secure workplace.

Be more vigilant post the training

Contribute to the Organizations security overall

Requirements

No prior Experience needed, some basic understanding of day to day systems would suffice

Description

Welcome to the Ultimate Information Security Awareness Course! In today's world, information is the most valuable commodity, and the consequences of losing it can be catastrophic. As a result, information security has become a critical issue in organizations worldwide. Whether you're an employee, manager, or CEO, understanding the basics of information security is essential to keep your organization safe from cyber-attacks, data breaches, and other malicious activities.In this course, we'll dive deep into the world of information security and provide you with a comprehensive understanding of the role that you play in keeping your organization safe. This course was developed after extensive research over a period of time by industry experts to identify the scenarios that could present themselves based on the roles. We have also tried to making very captivating for the learners to be engaged and enjoy the learning process.Our course is specifically tailored to your role, whether you're from C-Suite, Marketing, Mergers & Acquisition or a HR, Legal or Finance professional or end-user, ensuring that you have the necessary knowledge to secure your organization's information assets effectively. With practical exercises, real-life case studies, and expert advice from seasoned security professionals, you'll gain the confidence and expertise to manage your organization's security risks.Join us on this exciting journey to take your information security awareness to the next level!

Overview

Lecture 1 Introduction

Section 1: Introduction to General Cyber Awareness

Lecture 2 Why Security is important

Section 2: Phishing- Game of Emotions

Lecture 3 Game of Emotions

Lecture 4 Desire

Lecture 5 Fear

Lecture 6 Curiosity

Lecture 7 Impulse

Lecture 8 Trust & Happiness

Section 3: Types of Cyber Attacks

Lecture 9 Social Engineering, Phishing & Business Email Compromise (BEC)

Lecture 10 Vishing, Smishing & Spear Phishing

Lecture 11 Session Hijacking & Malvertizing

Section 4: Anatomy of a Phishing Email

Lecture 12 Anatomy of a Phishing Email

Section 5: How can you Make a Difference

Lecture 13 How can you make a Difference

Section 6: Role Based Scenarios Section - All employees & End Users

Lecture 14 Introduction to Role Based Scenarios Section

Lecture 15 Why are employees easy target for hackers

Lecture 16 Common Types of Attacks

Lecture 17 Phishing attacks (spear phishing, whaling, etc.)

Lecture 18 Types of Attacks Part 01

Lecture 19 Types of Attacks Part 02

Lecture 20 Cyber Frauds on Social Media

Lecture 21 Have you been clicking on ads or pop ups on sites & Internet of Things (IoT)

Lecture 22 Unusual scenarios where users are tricked Part 01

Lecture 23 Unusual scenarios where users are tricked Part 02

Lecture 24 How can you protect Yourself & the Organization

Lecture 25 Summary

Section 7: C-Suites

Lecture 26 Why are C-Suites subjected to Cyber Attacks

Lecture 27 What kind of attacks are planned against C-Suites

Lecture 28 How are attacks against C-Suites planned

Lecture 29 Techniques of gathering information

Lecture 30 What can one bad click result in & what should you do protect Yourself

Section 8: Human Resource (HR)

Lecture 31 Why Human Resource (HR) professionals are targets of Cyber Attacks

Lecture 32 Cyber frauds relevant to HR Function

Lecture 33 What can one bad click do

Lecture 34 Summary of Cyber frauds in HR

Lecture 35 What can HR Professionals do protect themselves from Cyber Threats

Section 9: Mergers & Acquistions (M&A)

Lecture 36 Why are Mergers & Acquisitions (M&A) teams targetted

Lecture 37 What are the different kinds of attacks M&A teams face

Lecture 38 What can bad click result in & how can you protect

Section 10: Legal

Lecture 39 Why & how legal teams & are facing Cyber Threats

Lecture 40 A realtime scenario where "one bad click " caused a catastrophic effect

Lecture 41 What can legal professionals do to protect themselves from Cyber Threats

Lecture 42 Summary of role & scenario based section

Section 11: Course conclusion

Lecture 43 Course conclusion & summary

This course is for users who connect to internet and for all employees in an organization