Course name:
Cyber Security Awareness Training
Description:
Cyber Security affects everyone. Anyone - from individuals and small companies to government agencies and global enterprises - using a computer, digital or mobile device, as well as any other system or process connected to the internet of things, may fall victim to a cyber attack. Aziksa Security Awareness Courses specializes in helping employees understand the mechanisms of spam, phishing, spear-phishing, malware and social engineering and are able to apply this knowledge in their day-to-day job.
Duration:
02:00 Hours
Audience:
Everyone
Prerequisites:
None
Course outline:
<p style="margin: 0in 0in 15pt; line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Aziksa Security Awareness Training specializes in helping employees understand the mechanisms of spam, phishing, spear-phishing, malware and social engineering and are able to apply this knowledge in their day-to-day job. </span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Data Protection</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Learn about a variety of data protection issues including your responsibilities toward data privacy, data destruction standards, and dangers of leaving private/confidential information out in the open.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Insider Treats</span></strong>&nbsp;</p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Topics include the danger posed by insider threats, the three types of insider threats, and what to do if you observe suspicious activity.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Malicious Links</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Learn how seemingly safe links can be dangerous, how to identify the components of a link and break down the parts of a URL, and what to do if you are targeted with a malicious link.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Malware</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Understand the definition of malware, common varieties of malware, how malware is used, and the value and limitations of anti-virus software.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Mobile Devices</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Learn how malware is delivered to your mobile device, ways to protect your device, and what to do if your device is lost or stolen.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Passwords</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">How to protect your passwords, the different cyber-attacks that put your password at risk, what constitutes a strong password, how to manage your passwords, and how multi-factor authentication keeps your account safer.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Physical Security</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Lean what can happen when your device is stolen, why you might be a target for device theft, what is physical security, and steps that will enhance the security of your device.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Security Outside the Office</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">What are the most dangerous attack methods that put your information at risk, the risks of using a portable storage device, the difference between a public and a secure network, and what to do if your device is lost or stolen. </span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Social Networking</span></strong>&nbsp;</p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Protect yourself when posting online, how apps can make you vulnerable, what makes a site a social network, and how to utilize privacy settings.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Social Engineering</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Learn the difference between a technical and non-technical attack, different types of social engineering, and what to do if you are the target of a social engineering scam.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Spear Phishing</span></strong></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">The dangers of spear fishing and why spear phishing poses a threat to your organization, the three types of spear phishing emails, and the indicators of a spear phishing email.</span></p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><strong><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Surfing the Web</span></strong>&nbsp;</p> <p style="line-height: 18pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; mso-bidi-font-family: 'Open Sans'; color: #666666;">Learn about the safest way to surf the web, secure websites, and how to identify and avoid malicious sites and links.</span></p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.