Cyber awareness training on-line delivered to you, at a time, place and pace that can be tailored to suit the individual, you are always in control.
About The Course
Our on-line cyber awareness training program is structured into 9 comprehensive classes or modules. The modules cover all you need to protect your cyber activity and 1 bonus module.
By completing the modules you will gain the knowledge and awareness that are vital in order to prevent breaches, by recognising common threats to users at home and in the business.
Arm yourself with an understanding of how hackers think and attack.
Module 1: Computer Usage – Activities that are considered acceptable or prohibited are often dependant on your workplaces policies, but some activities should always be considered too big a risk for businesses to allow.
i. Ethical computer use; make sure you are aware of the computer usage policies of your company. If you have no clear policy, it’s time to put one in place. Because both the company and employees need to understand the dangers inherent in every-day activities on the computer.
ii. Software installs; What can and can’t be installed, who needs to know.
iii. File sharing; How dangerous is it and why?
iv. Day to day situations.
Watch module 1 and discuss what would be a sensible policy for you.
Module 2: Your Identity – Protecting your identity and access to your online and offline accounts is a key factor in having strong security. In Module 2 we discuss the methods you can employ to achieve this.
i. Authentication, methods used to provide access.
ii. factor authentication, is a password enough to secure the application or do we need to consider multiple proofs of identity before granting access?
iii. passwords, what constitutes good password hygiene?
iv. online identity, What this means, why we must protect it.
v. ID theft, How can we avoid risky behaviours and environments.
Your online identity is precious, GDPR was brought in to give us all more legislative protection. We all need to understand what it is and how to protect it.
Module 3: In and around the Office – Cyber Awareness includes being aware of the methods being employed by the Cyber-criminals, Cyber Awareness will put you in a position to spot and avoid potential threats.
i. Social Engineer in person and over the phone. The things they say and how you need to react.
ii. Physical security looking out for your workplace by being vigilant.
iii. situational awareness When you might be at risk?
Module 4: Email Communication – Email is one of the preferred tools of the cyber-criminal, The ubiquitous Nigerian Scam where a sender posing as a Nigerian wanting to have access to your bank details in order to transfer funds is unlikely to catch you out.
But what about the email from your CEO that looks so plausible. Spear Phishing is directly targeting you, with scenario’s using information relating directly to your business, your colleagues and current interests.
ii. Spear Phishing
iv. Digital Email signatures and encryption
Being overwhelmed by the quantities of email is a major issue and a reason for extra vigilance, use technology and good habits to reduce your risk.
Module 5: Portable Media – Cyber-criminals don’t restrict themselves to the Internet.
iii. Wi-Fi enabled devices
Misuse and loss are all too common and can compromise you and your business in all sorts of ways, once again technology and good habits are the key to reducing your risk.
Module 6: Social Media – Much like email the Cyber-criminals are targeting you using Social Media and the social aspect gives them added credibility and trust, especially if they gain access to stolen credentials belonging to someone you know well.
i. Social Media usage and tips
ii. Do’s and Don’ts
Cyber awareness is the key to enjoying a safe experience of the social media we all love. For the modern individual Social Media has in many ways replaced the diary. In the old days it was just your mum who might access your diary, now everyone gets to read it including your employers, competitors and customers.
Module 7: Using the Web – The recent Panorama documentary (What they know about us) describing the way Amazon routinely monitor customer behaviour, lifted the lid on the practices of the Internet giants. The program described how Amazon monitor and attempt to predict and effect the online habits of its customers.
Cyber-criminals also use the Internet to reach potential victims.
Understand the role of the Cookie and how out of date Java can provide a way into your computer.
iv. HTTP vs. HTTPS
v. General tips
Amazon earned around £50bn for 2017 it is estimated Cyber-crime was worth £130bn world-wide.
Module 8: Home Computer Usage and Working from Home – Working from home is increasingly becoming the norm within many businesses, how can it be done safely?
i. Security mechanisms and best practices
Home workers are increasingly targeted by Cyber-criminals looking for backdoors into organisations.
Module 9: Wireless Security and Mobile Devices – Lots of work forces are increasingly mobile, what are the risks? How can we avoid them? How does a Man in the Middle attack work?
i. Wi-Fi attacks explained
ii. Wi-Fi___33 security Tips
iii. QR codes
iv. Mobile Device security and tips
A trip to your local coffee shop may present dangers beyond caffeine induced palpitations and centimetres on your waist line.
Module 10: Bonus Material – Cyber Security Tips and Tricks – Verifying HTTPS, generating secure passwords, Pastor, Google Authenticator, Free Email certificate, researching IP and mail header, browsing traces, where hackers shop.