CyberSecurity Awareness Training Course Outline
Safe In The Cloud
Cloud storage fits the demand for convenience, mobility and cost-efficiency when it comes to storing data, provided you intelligently keep your information safe from online threats.
In this module we will discuss how to manage the risks without missing out on the benefits of the cloud.
Malware is a catch-all term for various malicious software, including viruses, adware, spyware, browser hijacking software, and fake security software. Once installed on your computer or device, these programs can seriously affect your privacy and your security. The trickiest thing about malware is that it’s often delivered under the radar so you don’t notice anything until it’s too late. In this module you will learn how to stay vigilant defend yourself against malware threats.
A weak password is like a cheap lock; it’s easy to break, and once the door is open, cyber-criminals can take just about anything, which is no surprise that identity theft is one of the most common outcomes from data breaches. In this module you will learn about the importance of good password hygiene that should not be ignored and the costly risks of identity theft including financial loss, time and reputation to resolve.
Ransomware is the single biggest risk to your digital security on your PC, mobile or tablet, regardless of your operating systems. In this module you will learn what preemptive steps to take so you don’t get caught off guard.
Capable of encrypting your data and leaving you unable to access vital personal files and folders, ransomware can be very expensive whether you opt to pay the ransom or not. In this module you will learn about the dangers of ransomware and how to avoid them.
A whaling attack is a social engineering scam that goes directly after a company’s top brass.
Criminals may pose as person of authority, often requesting urgent action. In the module you will learn how to look out for telltale signs of an attack and the importance of a enforcing company policy and procedures without exception.
If the shoe fits
Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychology. Criminals can sweet-talk their way right into your organization without a blink of an eye. Even if you have all the security provisions and defensive technologies in place, your data center, your cloud deployments, your building’s physical security could be a great risk. This module provides you with relatable scenarios that will help you identify and stand up and question when a situation isn’t quite right.
My Social Media Account
In this module we will explore how hackers can scan your social media profiles for information and study your behavior, your vulnerability and openness online to post information about minuscule personal details on social media. In most cases, individuals assume it is not threatening to them or their workplace. It becomes easily accessible for hackers to gain information about multiple employees after retrieving information from one. Most individuals neglect their privacy settings or publicly post personal notes and photos. This allows cyber criminals to take that information and launch targeted social engineer attacks.
Sharing the details of your life with your ‘friends’ and interest groups can be fun and entertaining. But some faceless ‘friends’ or ‘friends-of-friends’ may only be interested in your personal information, your photos and your whereabouts.
Online identity theft can affect anyone but it may be preventable by being cautious and taking some precautionary steps when active on social media. This module will increase your awareness to the impacts of careless online habits.
Public Wi-Fi networks are vital for staying connected and hotspots are enticing targets for hackers. Widely available freeware makes eavesdropping on emails and web browsing as simple as pressing a button.
This module will bring awareness to the precautions to take to keep you and your data safe when you’re on the go.
USB Memory Stick
Although USB flash drives are extremely useful devices for transferring data, they do come with security risks.
Not only can USB devices contain malware and spread infection as soon as they are connected to a network, they can also be booby-trapped. This scenario demonstrates how an unsuspecting employees can be tricked into loading spyware without the user ever realizing that their computer has been hijacked.
Hackers and bad actors are very sophisticated, they use a variety of methods to complete their attack including vishing, one form of social engineering.
Unfortunately, everyone is a potential target for an attack. Even more concerning is that cyber-criminals seem to recognize that employees are the easiest way to access private information. This module will highlight attack scenarios and the scare tactics used to prey on their victims.
Virtual Private Network
In this module you will learn about securing your network through a VPN (Virtual Private Network). The VPN creates a virtual encrypted tunnel between you and a remote server operated by a VPN service.
All your internet traffic is then routed through this tunnel, so your data is secure from prying eyes. Best of all, your computer appears to have the IP address of the VPN server, masking your identity and location.
Caught in the Numbers
Grow your followers, become a social media celebrity and reap the benefits of popularity, is very appealing to teens eager to impress and fit in. This module illustrates temptations of social media to make bad judgement and costly mistakes, and highlights associated risks.
Charge it up
Your battery is running low, you see a USB port in the members lounge, crisis adverted, don’t be sure! Connecting your phone to an unknown port has its risks, as an invisible attacker is now collecting information while your phone is plugged in to a hacked outlet. This module outlines the precautions to remain safe when on the go and using public charging stations. This is not limited to USB hubs in airports and cafes, but all public Wi-Fi access points.
Is your personal online data and accounts really gone when deleted? Your data and accounts It may disappear from plain view, but that doesn’t mean it never happened. In this module you will learn how to protect and clean up your digital tracks.
As a result of a teens constant online presence and interactions, they are at risk for being preyed upon by online predators luring their young victims with false identities by developing trusting relationships to exploit them, their data and networks, money and reputation. This module will highlight popular scams targeting teens – we know you’ve heard this before, and we see the eyeballs roll, will provide you with the precautionary steps to reduce your exposure to risk will go a long way.
Your digital identity or DNA is your online profile and your digital footprint is the permanent trail you leave behind affects your reputation positively/negatively. We must be aware to how our data is being used and by whom. In this module we provide you with strategies to help you maintain and adopt measures to protect your digital DNA.