title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Cybersecurity 1: Fundamentals for Employees
Course Description
Overview
Cyberattacks are increasing at an alarming rate. Radware reported that there were 2.3 billion data breaches in 2018 – almost three times more than the year before – which cost companies about $600 billion. Most companies have installed firewalls and other cyber defenses to stop cyberattacks, but they are not foolproof. In fact, one of the key risk factors in cyberattacks is human error. A recent Intel Security survey found that 97 per cent of people could not identify all the phishing emails in a sample of 10 emails.The need for training of non-IT staff is critically important. This one-day course will ensure that staff gain an appreciation of company-wide measures to protect against cyberattacks and their own role in the success of these defense measures. Most importantly, it will help staff recognize phishing attacks, and when a cyberattack has been successful, understand what steps to take to mitigate the effect. The importance of practicing safe social media behavior to prevent cyber criminals from mining sensitive personal and company data will also be discussed. In the capstone activity each participant will create a personal cybersecurity plan.
Objectives
- Understand the history and the current state of cyberattacks in terms of quantity and cost to business.
- Name and explain the method used in various types of cyberattacks.
- Outline the risk of human error in inadvertently contributing to the success of cyberattacks.
- Have an appreciation of company-wide measures to protect against cyberattacks and their role in the success of these defense measures.
- Explain the importance of a company culture that focuses on cybersecurity to successfully defend against attacks.
- Realize the social media mining activities of cyber criminals and be better able to practice safe social media behavior.
- Outline the information needed in a social media security policy.
- Understand and practice good security behaviors when working remotely or travelling.
- Recognize phishing attacks by identifying the subtle clues that are present in all phishing attacks.
- When a cyberattack has been successful, understand what steps to take to mitigate the effect.
- Create a personal cybersecurity plan.
Topics
- You will spend the first part of the day getting to know participants and discussing what will take place during the workshop. Students will also have an opportunity to identify their personal learning objectives.
- In this session, we explore the past and current state of cybercrime, and take a look at the huge financial cost of cybercrime for companies.
- Next, we look at the various types of cyberattacks.
- Next, we learn about the role human error plays in the success of cyberattacks.
- Then, we look at the defenses that companies have set up to protect them from cyberattacks.
- Next, we looked at the defenses that companies have set up to protect remote workers from cyberattacks.
- Then, we discuss some cybersecurity scenarios and what would be the necessary next step to mitigate the damage.
- Next, we focus on cyberattacks perpetrated on individuals and the importance of information gleaned from social media for those attacks.
- Next, we practice recognizing phishing attacks using the subtle clues left by cybercriminals.
- Next, we explore ways we can reduce the chances of a successful cyberattack.
- Lastly, everyone creates a personal cybersecurity plan.
- At the end of the course, students will have an opportunity to ask questions and fill out an action plan.
Related Courses
-
Managing Conflict (Second Edition)
LO-097005- Duration: 1 Day
- Delivery Format: Classroom Training, Online Training
- Price: 595.00 USD
-
Bullying in the Workplace
VS-s2711- Duration: 1 Day
- Delivery Format: Classroom Training, Online Training
- Price: 585.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.
STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.