Course name:
Cyber Security Awareness Training
Description:
Aziksa Security Awareness Training specializes in helping employees understand the mechanisms of spam, phishing, spear-phishing, malware and social engineering; and are able to apply this knowledge in their day-to-day job. You get high quality web-based interactive training.
Duration:
2 Hours
Audience:
Everyone
Prerequisites:
None
Course outline:
<p class="MsoNormal" style="margin-bottom: 15pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="color: #666666; font-family: Verdana, sans-serif; line-height: 24px;">Aziksa Security Awareness Training specializes in helping employees understand the mechanisms of spam, phishing, spear-phishing, malware and social engineering; and are able to apply this knowledge in their day-to-day job. You get high quality web-based interactive training.</span></p> <p class="MsoNormal" style="margin-bottom: 15pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong style="line-height: 18pt;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Data Protection</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Data Protection module covers topics on: your responsibilities toward data privacy, data destruction standards, and dangers of leaving private/confidential information out in the open.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Insider Treats</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Insider Threats module covers topics on: danger insider threats pose, the three types of insider threats, and what to do if you observe suspicious activity.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Malicious Links</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Malicious Links module covers topics on: why links can be dangerous, how to identify the components of a link and break down the parts of a URL, and what to do if you are targeted with a malicious link.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Malware</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Malware module covers topics on: what malware is, common varieties of malware, how malware is used, and the value and limitations of anti-virus software.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Mobile Devices</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Mobile Devices module covers topics on: how malware is delivered to your mobile device, ways to protect your device, and what to do if your device is lost or stolen.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Passwords</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Passwords module covers topics on: the different cyber-attacks that put your password at risk, what constitutes a strong password, how to manage your passwords, and how multi-factor authentication keeps your account safer.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Physical Security</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Physical Security module covers topics on: the danger of theft of a device, why you might be a target for device theft, what is physical security, and steps that will enhance the security of your device.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">&nbsp;</p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Security outside the Office</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Security outside the Office module covers topics on: attack methods that put your information at risk, the risks of using a portable storage device, the difference between a public and a secure network, and what to do if your device is lost or stolen.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Social Engineering</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Social Engineering module covers topics on: difference between a technical and non-technical attack, different types of social engineering, and what to do if you are the target of a social engineering scam.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Social Networking</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Social Networking module covers topics on: how information posted online can be used against you, how apps can make you vulnerable, what makes a site a social network, and how to utilize privacy settings.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Spear Phishing</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Spear Phishing module covers topics on: why spear phishing poses a threat to our organization, the three types of spear phishing emails, and the indicators of a spear phishing email.</span></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><strong><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">Surfing the Web</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><span style="font-family: 'Verdana','sans-serif'; mso-bidi-font-family: 'Open Sans'; color: #666666;">The Surfing the Web module covers topics on: safe web surfing, secure websites, and how to identify and avoid malicious sites and links.</span></p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.