Security Awareness Training
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative.
This course is a complete foundational security awareness training program that covers a wide array of topics for nearly every type of end-user and learner level. The content is designed to allow organizations to be able to provide a comprehensive training program to help them protect their information assets against threats.
This training lasts approximately 2 hours and was designed to be engaging and is based on real scenarios staff may face. The training is modular and does not have to be completed in one sitting.
Topics included in this course are as follows:
• Importance of Security
• Data and Account Security
• Networking and Mobile Security
• Social Engineering
Importance of Security
-This module will introduce you to security awareness basics. We will discuss the importance of and review the components of security. We will conclude the module by examining hackers and what they target.
Data and Account Security
-The security of data must always be your top priority. In this module, we will discuss how to safeguard and protect data that is collected by organizations. We will also examine the different threats to data and the roles and responsibilities of people managing the data.
-In order to protect the data and ensure organizations are secure, we must employ good password practices. In this module, we will learn the importance of having a long and complex password. There are examples of various passwords and the time it takes to break them. We also provide tips on creating strong and secure passwords, selecting appropriate security questions, and why you should use multi-factor authentication.
Networking and Mobile Security
-The growth of the Internet has led to the development of new security issues. In this module, we will explore the different vulnerabilities and learn how to properly secure our network and mobile devices.
-In this module, we will examine the different types of malware and identity the main platforms used by attackers. We will analyze the different symptoms of malware infections and provide best practices on avoiding the attacks.
-One of the most frequently used methods for attacking organizations is through social engineering. This module will define social engineering, identify common attacks, and provide strategies for overcoming it.