Equip your employees with the knowledge to identify and avoid insider training.
Course Description
This course shows employees how to recognize potential threats and risky behaviors, and teaches them how to mindfully respond to cyber-threats. Along the way, employees have the opportunity to apply what they’ve learned in a variety of realistic scenarios. Specific topics include phishing, pharming, social engineering, secure wireless connections, creating strong passwords, encryption, safe browsing, and watering hole attacks.
Learning Objectives
- Phishing
- Pharming
- Social Engineering
- Secure Wireless Connections
- Creating Strong Passwords
- Encryption
- Safe Browsing
- Watering Hole Attacks
Course Syallabus
The Introduction presents a high level of all the concepts covered in Data Security and Privacy. A one-page tutorial instructs the learner on how to navigate the course
- 2 Customizable Content Pages
- 1 Custom Video Page
In this module, learners will review the ways that employees are targeted in data security breaches, and best practices to protect sensitive information.
In this module, learners will review what kinds of information thieves are after and why employees need to protect it.
In this module, learners will review not only what information to protect but also who is after it and how they intend to get it.
In this module, learners will review basic steps they can take to protect private information.
- Custom Data Security Policy
In this module, learners will review how to respond quickly and effectively to stop thieves from accessing private information.
This final module summarizes the course content and offers numerous opportunities for corporate messaging.
- 1 Custom Policy
- 2 Customizable Content Pages
Course Materials and Tools
For Companies and Organizations
For Higher Education Institutions