This course offers fundamental knowledge and skills to identify and prevent against today’s cyber attacks. The goal is to develop your understanding of threats, exposure points, and ways that you can reduce the risk at every level of your organization.
This course emphasizes practices to protect devices and accounts for the protection of information.
When you have completed the level 1 modules you will be able to:
Module 1: Perfecting Passwords
- Identify the security risks that a weak password exposes your personal and work data to
- Describe the safeguards available to reduce vulnerabilities to your personal and work data
- Identify best practices for creating a strong password/passphrase
- Recall tips for effectively managing passwords
- Module 2: Security Basics: Email and Social Engineering
Module 2: Security Basics: Email and Social Engineering
- Recall what it means to be cyber secure
- Recognize that emails and other communications can be malicious
- Explain your role in defending against phishing as it relates to social engineering
Module 3: Security Basics: Internet and Cloud Security
- Recognize how websites, social media posts, and direct messages can be malicious
- Identify ways to use online resources safely
- Recognize that technical safeguards can’t always protect you
Module 4: Security Basics: Passwords and Authentication
- Recognize that attackers actively attempt to steal account passwords
- Recognize the risks posed by unauthorized access to your account
- Recognize your role in account security
Module 5: Social Networking
- Explain why social networking can pose a risk
- Describe how to identify threats while social networking
- Identify how to avoid threats while social networking
Module 6: Why Your Security Awareness Training Program is Important
- Define phishing attacks
- Explain how your security awareness training program can help you avoid phishing attacks
When you have completed the level 2 modules you will be able to:
Module 1: Identifying Compromised Accounts
- State the risks of compromised accounts
- Explain how compromises happen
- Describe what you can do to prevent your account from being compromised
- Identify how to detect a compromised account
Module 2: Mitigating Compromised Devices
- Identify why attackers compromise devices
- Explain how devices can be compromised
- Describe how to prevent your devices from being compromised
- Identify how to recognize compromised devices
Module 3: Organisational Data: What to Do If You Suspect a Breach
- Identify what constitutes a data breach
- Recognize what to do if you believe your organisation’s data has been breached
Module 4: Phish Finder: Spotting Warning Signs
- Recognize some of the obvious signs of phishing attacks
- Recall what to do if you see an email that contains one or more of these warning signs
Module 5: Securing Data: Know Your Role
- Describe your role in protecting your organisation’s data
- Recognize the importance of following your organisation’s policies and procedures
Module 6: USB Device Safety
- Define USB devices
- Explain how to safely use a USB device and protect against data breaches, identify theft, and other threats
- Recognize the importance of knowing where your USB device came from, how to use, and safely store
- Identify why you should not trust unknown USB chargers or ports
- Differentiate between data that is safe and unsafe for storage on a USB device
Target Audience
Price
$35
Length
1 hour
Content Provider
The course modules were developed by Proofpoint, Inc.
Language
English