Course name:
Cyber Security Awareness
Description:
Aziksa Security Awareness Training specializes in helping employees understand the mechanisms of spam, phishing, spear-phishing, malware and social engineering and are able to apply this knowledge in their day-to-day job.
Duration:
02:00 Hours
Audience:
Everyone
Prerequisites:
None
Course outline:
<p class="Heading2-Text" style="margin-top: 0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Aziksa Security Awareness Training specializes in helping employees understand the mechanisms of spam, phishing, spear-phishing, malware and social engineering and are able to apply this knowledge in their day-to-day job. Our content is regularly updated to address new learning and cyber events.</span></p> <p class="Heading2-Text">&nbsp;</p> <p class="Heading2-Text"><strong><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">List of cyber awareness training courses</span></strong></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">&nbsp;</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Data Protection</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Learn about a variety of data protection issues including your responsibilities toward data privacy, data destruction standards, and dangers of leaving private/confidential information out in the open.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Insider Threats</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Topics include the danger posed by insider threats, the three types of insider threats, and what to do if you observe suspicious activity.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Malicious Links</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Learn how seemingly safe links can be dangerous, how to identify the components of a link and break down the parts of a URL, and what to do if you are targeted with a malicious link.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Malware</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Understand the definition of malware, common varieties of malware, how malware is used, and the value and limitations of anti-virus software.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Mobile Devices</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Learn how malware is delivered to your mobile device, ways to protect your device, and what to do if your device is lost or stolen.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Passwords</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">How to protect your passwords, the different cyber-attacks that put your password at risk, what constitutes a strong password, how to manage your passwords, and how multi-factor authentication keeps your account safer.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Physical Security</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Lean what can happen when your device is stolen, why you might be a target for device theft, what is physical security, and steps that will enhance the security of your device.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Security Outside the Office</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">What are the most dangerous attack methods that put your information at risk, the risks of using a portable storage device, the difference between a public and a secure network, and what to do if your device is lost or stolen. </span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Social Networking</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Protect yourself when posting online, how apps can make you vulnerable, what makes a site a social network, and how to utilize privacy settings.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Social Engineering</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Learn the difference between a technical and non-technical attack, different types of social engineering, and what to do if you are the target of a social engineering scam.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Spear Phishing</span></p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">The dangers of spear phishing and why spear phishing poses a threat to your organization, the three types of spear phishing emails, and the indicators of a spear phishing email.</span></p> <p class="Heading2-Text"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Surfing the Web</span></p> <p>&nbsp;</p> <p class="Heading2-Text" style="margin-left: 1.0in;"><span style="font-size: 12.0pt; mso-bidi-font-size: 10.0pt;">Learn about the safest way to surf the web, secure websites, and how to identify and avoid malicious sites and links.</span></p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.