Cyber Awareness Training


Learn how to defend yourself from Cyber Attacks

What you will learn

Cyber Awareness

Phishing Awareness

Identify Cyber Threats

Avoid Cyber Threats

Stay safe online

Protect yourself from cyber crime

Description

Why you should take this Cyber Awareness Training?
Technology can stop a lot of cyber attacks – but not all. You can have the latest cutting edge security systems in place, if your company staff is not cyber aware it’s only a matter of time until a breach will happen. Be proactive – not reactive

  • Every major breach these days typically starts with Social Engineering
  • Millions of people are targeted with phishing and spear phishing attacks on a daily basis
  • It only takes one wrong click or user action to have the whole organization compromised
  • Attackers use Email, Phone calls, Impersonation, Portal Media, QR Codes and other vectors
  • Donโ€™t fall victim and learn how you can protect yourself

This Cyber Awareness training program educates users on threats and methods hackers use and will help organizations to mitigate risk. I recommend this training to any company employee or contractor using Information Technology as part of their jobs. The cyber security course’s online modules take the student throughย  steps to stay secure.


Course Modules
Before starting the training, you will be presented with a little entry quiz to check how Cyber aware you already are. All modules contain a video lesson, a quiz at the end and some useful links. At the end of the training you will have the opportunity to test your acquired knowledge by taking an 18 question exam and you will receive a downloadable cheat sheet with best practices in bullet points based on the training.


Subscribe to latest coupons on our Telegram channel.

Module 1: Computer Usage
Module 2: Your Identity
Module 3: In and around the Office
Module 4: Email Communication
Module 5: Portable Media
Module 6: Social Media
Module 7: Using the Web
Module 8: Home Computer Usage and Working from Home
Module 9: Wireless Security and Mobile Devices


About the Author
Martin is an expert in Cyber Security Veteran with 25 years of experience holding most prestigious certifications. He provides Cyber Security services to government entities and commercials worldwide. Martin is a former IT security trainer to the US military and incredibly highly accredited and experienced ethical hacker! Real-life experience in plain English for non-technical employees – to encourage secure practices and protect your business.


What is Social Engineering?
Most of the data breaches you read about in the news today start off with an attack vector referred to as Social Engineering. Unsuspecting users are being targeted with phone calls, phishing, spear phishing, portable media and other types of attacks in order to gain access to corporate networks. The majority of IT users have no technical background and are unaware of the techniques and methods hackers use to target them.

English
language

Content

Introduction

Introduction

Entry quiz

Entry quiz

Computer Usage

Computer Usage
Module 1 review quiz
Useful links

Your Identity

Your Identity
Module 2 review quiz
Useful links

In and around the office

In and around the office
Module 3 review quiz
Useful links

Email Communication

Email Communication
Module 4 review quiz
Useful links

Portable Media

Portable Media
Module 5 review quiz
Useful links

Social Media

Social Media
Module 6 review quiz
Useful links

Using the Web

Using the Web
Module 7 review quiz
Useful links

Home Computer Usage and Working from Home

Home Computer Usage and Working from Home
Module 8 review quiz
Useful links

Wireless Security and Mobile Devices

Wireless Security and Mobile Devices
Module 9 review quiz
Useful links

Final Exam

Final Exam

Cyber Awareness Cheat Sheet

Cyber Awareness Cheat Sheet