Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Role Based Information Security Awareness Training

    Posted By: ELK1nG
    Role Based Information Security Awareness Training

    Role Based Information Security Awareness Training
    Published 3/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.79 GB | Duration: 1h 33m

    General users & role specific scenarios of cyber risks

    What you'll learn

    Identify common security threats and attacks that can impact your organization and recognize the signs of a potential security breach.

    Understand the importance of role-based security and the specific responsibilities and best practices for your job function to maintain a secure workplace.

    Be more vigilant post the training

    Contribute to the Organizations security overall

    Requirements

    No prior Experience needed, some basic understanding of day to day systems would suffice

    Description

    Welcome to the Ultimate Information Security Awareness Course! In today's world, information is the most valuable commodity, and the consequences of losing it can be catastrophic. As a result, information security has become a critical issue in organizations worldwide. Whether you're an employee, manager, or CEO, understanding the basics of information security is essential to keep your organization safe from cyber-attacks, data breaches, and other malicious activities.In this course, we'll dive deep into the world of information security and provide you with a comprehensive understanding of the role that you play in keeping your organization safe. This course was developed after extensive research over a period of time by industry experts to identify the scenarios that could present themselves based on the roles. We have also tried to making very captivating for the learners to be engaged and enjoy the learning process.Our course is specifically tailored to your role, whether you're from C-Suite, Marketing, Mergers & Acquisition or a HR, Legal or Finance professional or end-user, ensuring that you have the necessary knowledge to secure your organization's information assets effectively. With practical exercises, real-life case studies, and expert advice from seasoned security professionals, you'll gain the confidence and expertise to manage your organization's security risks.Join us on this exciting journey to take your information security awareness to the next level!

    Overview

    Lecture 1 Introduction

    Section 1: Introduction to General Cyber Awareness

    Lecture 2 Why Security is important

    Section 2: Phishing- Game of Emotions

    Lecture 3 Game of Emotions

    Lecture 4 Desire

    Lecture 5 Fear

    Lecture 6 Curiosity

    Lecture 7 Impulse

    Lecture 8 Trust & Happiness

    Section 3: Types of Cyber Attacks

    Lecture 9 Social Engineering, Phishing & Business Email Compromise (BEC)

    Lecture 10 Vishing, Smishing & Spear Phishing

    Lecture 11 Session Hijacking & Malvertizing

    Section 4: Anatomy of a Phishing Email

    Lecture 12 Anatomy of a Phishing Email

    Section 5: How can you Make a Difference

    Lecture 13 How can you make a Difference

    Section 6: Role Based Scenarios Section - All employees & End Users

    Lecture 14 Introduction to Role Based Scenarios Section

    Lecture 15 Why are employees easy target for hackers

    Lecture 16 Common Types of Attacks

    Lecture 17 Phishing attacks (spear phishing, whaling, etc.)

    Lecture 18 Types of Attacks Part 01

    Lecture 19 Types of Attacks Part 02

    Lecture 20 Cyber Frauds on Social Media

    Lecture 21 Have you been clicking on ads or pop ups on sites & Internet of Things (IoT)

    Lecture 22 Unusual scenarios where users are tricked Part 01

    Lecture 23 Unusual scenarios where users are tricked Part 02

    Lecture 24 How can you protect Yourself & the Organization

    Lecture 25 Summary

    Section 7: C-Suites

    Lecture 26 Why are C-Suites subjected to Cyber Attacks

    Lecture 27 What kind of attacks are planned against C-Suites

    Lecture 28 How are attacks against C-Suites planned

    Lecture 29 Techniques of gathering information

    Lecture 30 What can one bad click result in & what should you do protect Yourself

    Section 8: Human Resource (HR)

    Lecture 31 Why Human Resource (HR) professionals are targets of Cyber Attacks

    Lecture 32 Cyber frauds relevant to HR Function

    Lecture 33 What can one bad click do

    Lecture 34 Summary of Cyber frauds in HR

    Lecture 35 What can HR Professionals do protect themselves from Cyber Threats

    Section 9: Mergers & Acquistions (M&A)

    Lecture 36 Why are Mergers & Acquisitions (M&A) teams targetted

    Lecture 37 What are the different kinds of attacks M&A teams face

    Lecture 38 What can bad click result in & how can you protect

    Section 10: Legal

    Lecture 39 Why & how legal teams & are facing Cyber Threats

    Lecture 40 A realtime scenario where "one bad click " caused a catastrophic effect

    Lecture 41 What can legal professionals do to protect themselves from Cyber Threats

    Lecture 42 Summary of role & scenario based section

    Section 11: Course conclusion

    Lecture 43 Course conclusion & summary

    This course is for users who connect to internet and for all employees in an organization