engaging, relevant, ost effe tive training · engaging, relevant, ost effe tive training yber...

2
ENGAGING, RELEVANT, COST EFFECTIVE TRAINING Cyber Security Awareness This online Cyber Security Awareness training will help you to understand the potenal impact of common cyber threats. It outlines safe behaviour on the Internet and idenfies what steps you can take to protect yourself and your organisaon from cyber-aacks. The training is suitable for anyone who uses the Internet at work and applies to all devices that have internet access, including desktop and laptop computers, tablets and smartphones. The approximate duraon of this training is 1.5 hours. PURCHASING FOR YOUR ORGANISATION 0333 577 5016 [email protected] If you are buying for your organisaon rather than for yourself, it is simple for you to add learners, assign training and print cerficates. You will have a dashboard to monitor learner progress and aainment. Our training licences dont expire and are only assigned to a learner the first me they launch the training. Substanal discounts are applied to bulk purchases and annual licences are also available. The course has been cerfied by the CPD Cerficaon Service. The assessment is generated from queson banks so that the quesons change each me a candidate takes the assessment – making the training suitable for inial and refresher training. There is no limit on the number of aempts at the assessment and informave feedback is given so candidates can learn from their incorrect responses. A cerficate, with the CPD logo, is available for download on successful compleon of the assessment. £15 ONLY

Upload: others

Post on 08-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ENGAGING, RELEVANT, OST EFFE TIVE TRAINING · ENGAGING, RELEVANT, OST EFFE TIVE TRAINING yber Security Awareness INTRODU TION TO YER SEURITY Who is a potential target for cyber-attacks

ENGAGING, RELEVANT, COST EFFECTIVE TRAINING

Cyber Security Awareness

This online Cyber Security Awareness training will help you to understand the potential impact of common cyber threats. It outlines safe behaviour on the Internet and identifies what steps you can take to protect yourself and your organisation from cyber-attacks.

The training is suitable for anyone who uses the Internet at work and applies to all devices that have internet access, including desktop and laptop computers, tablets and smartphones.

The approximate duration of this training is 1.5 hours.

PURCHASING FOR YOUR ORGANISATION

0333 577 5016 [email protected]

If you are buying for your organisation rather than for yourself, it is simple for you to add learners, assign training and print certificates. You will have a dashboard to monitor learner progress and attainment.

Our training licences don’t expire and are only assigned to a learner the first time they launch the training. Substantial discounts are applied to bulk purchases and annual licences are also available.

The course has been certified by the CPD Certification Service.

The assessment is generated from question banks so that the questions change each time a candidate takes the assessment – making the training suitable for initial and refresher training.

There is no limit on the number of attempts at the assessment and informative feedback is given so candidates can learn from their incorrect responses. A certificate, with the CPD logo, is available for download on successful completion of the assessment.

£15 ONLY

Page 2: ENGAGING, RELEVANT, OST EFFE TIVE TRAINING · ENGAGING, RELEVANT, OST EFFE TIVE TRAINING yber Security Awareness INTRODU TION TO YER SEURITY Who is a potential target for cyber-attacks

ENGAGING, RELEVANT, COST EFFECTIVE TRAINING

Cyber Security Awareness

INTRODUCTION TO CYBER SECURITY Who is a potential target for cyber-attacks. Who commits cyber-crime. How human behaviour creates risks. The risks associated with the Internet of Things. How data protection regulations affect you with respect to cyber-crime. BRUTE FORCE ATTACKS What a brute force attack is. How social media is targeted by hackers to help them guess passwords. What makes for a secure password. INTERNET COOKIES The Why cookies are important and what they do. The risks associated with them. What you can do to minimise these risks. SOCIAL ENGINEERING ATTACKS Four kinds of social engineering - tailgating, phishing, baiting and chat-in-the-

middle. Ways to protect yourself from phishing attacks. MALWARE Types of malware - viruses, worms, Trojans, logic bombs and ransomware. Ways to defend against malware attacks. GRAYWARE How a variety of different grayware works - adware, keyloggers, bots and botnets. Ways to reduce grayware on your device. IDENTITY THEFT How criminals steal identities and what they do with them. Signs that indicate you may be a victim of identity theft. What to do if your identity is stolen.

0333 577 5016 [email protected]