Professional Development

Cyber Awareness

Cyber Awareness Courses

Professional Development Courses

Duration: 1.00 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady, Responsive

With today’s wide range of threats, it is a must to ensure minimum standards of security. We often think that purchasing expensive security appliances can take care of it, but it’s not even close. In this course, we learn the importance of injecting a cyber security culture in the mind of the people, executives and employees, understanding the roles of each department and key people to sustain the program, how to lead our teams for a more secure digital life and finally the importance of yearly training in maintaining constant secure environment.

Learning Objectives

By the end of this course, you will be able to:

  • Discuss the importance of security
  • Explain how the organization can support security culture
  • List the roles of different departments in supporting security culture
  • List the roles and responsibilities of Cybersecurity Culture (CSC) team members
  • Describe the difference between supporting the CSC as a manager and as a leader

Duration: 0.50 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

Maybe there is no way to eradicate threats and incidents completely, but surely being prepared and ready to anticipate incidents, can make the difference in limiting the damages. In this online training we will identify the best practices to mitigate incidents, different types of cyber security insurance; how to get our team ready for attacks and how to effectively manage the crisis when an incident occurs. Moreover, we will learn the importance of post-event crisis management.

Learning Objectives

By the end of this course, you will be able to:

  • Detail how to protect your organization from cyber attacks
  • Explain cyber insurance coverage
  • Prepare your team for cyber attacks
  • List the steps to manage incidents effectively
  • Explain how to deal with post incident damage

Duration: 0.50 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

When it comes to compliance, business and corporate management should keep a close eye at being obedient to all of the legal laws and regulations in regards to how they manage the business and preserving their data. In many cases, deviations from the baselines has cost businesses huge penalties and fines, as well as delayed losses; therefore, in this training, we will be looking at regulations and their importance, key items to secure our business and personal data.

Learning Objectives

By the end of this course, you will be able to:

  • Discuss details regarding international laws and standards and describe how they affect our business management
  • Explain bases of data classification
  • Detail how to manage your data securely
  • Describe mobile device threats and mitigations
  • List BYOD policy components

Duration: 0.50 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

Social engineering has become the favorite tool for hackers to target and breach sophisticated networks, it remains an open window in almost every environment. in this course we will gain knowledge about the latest social engineering techniques and how hackers can obtain business and personal information about us to craft targeted attacks that may result in huge damages. We will learn also to identify intellectual property and how to safeguard it.

Learning Objectives

By the end of this course, you will be able to:

  • List different social engineering attacks threatening executives
  • Describe how hackers gather your personal information
  • Explain how social engineering can harm executives
  • Define the concept of intellectual property and how to keep your data safe
  • Implement security standards that will help you protect yourself from social engineering

Duration: 0.50 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

We live in a busy, busy world. When it is so easy to connect to the internet and access vast amounts of information, it is easy to forget the dangers that lie in wait. From hotspots to password management, this interactive online course will walk you through end-user best practices. We will also discuss the importance of administrative rights, define types of physical attacks against privacy, and recommend ways to protect against malwares and viruses.

Learning Objectives

By the end of this course, you will be able to:

  • Identify insecure hotspots in public places and the risks involved in roaming
  • Differentiate between free and commercial VPN tunnels
  • Recognize legitimate and secure websites
  • Explain the importance of administrative rights
  • Select the correct method to stop the spread of a virus
  • Recommend ways to protect against malwares and viruses
  • List the dos and don’ts of password creation
  • Name solutions for password management
  • Define different types of physical attacks against privacy and provide solutions to mitigate this risk

Duration: 0.50 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

Failing to become cyber aware, failing to put measures in place that will protect our devices and network is also failing to protect our personal information, our place of business, and our customers. In this interactive online course we will discuss why classifying and safeguarding data is a priority that must not be ignored. We will also list the main types of classifications and state objectives for securing data.

Learning Objectives

By the end of this course, you will be able to:

  • Recognize three main types of classifications
    State the objectives for securing data
  • Describe how to keep personal and business data separate
  • Summarize business and personal standards for deleting and dumping data
  • Explain what to do when confronted with threats to mobile devices

Duration: 0.50 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

In our digital world today, attackers seem to be lurking behind every click of the mouse or tap on the screen. Many people forget that they are the keepers of their own security safety and the security safety of the institutions for which they are employed. In this interactive online course, we learn about the who, what, how, and why of security attacks. We discuss the potential losses associated with a successful security breaches by hackers and will understand the different way in which those security breaches can occur. Finally, we cover important actions you can take within your organization to limit security risks.

Learning Objectives

By the end of this course, you will be able to:

  • Identify who, what, and why hackers are targeting
  • List three main attacks that target employees
  • Name the possible losses associated with end-user hacks
  • Define an Acceptable Use Policy and what it consists of
  • Anticipate the ramifications of a cyber-attack on small- and medium-sized businesses (SMBs)
  • Compare and contrast the pros and cons of “Bring Your Own Device”
  • Define jailbreaking and rooting
  • Explore antivirus solutions

Duration: 0.50 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

Social engineering is the art of extorting information from employees that can assist a hacker to breach the security of an organization and can be done by a human or it can be done digitally. In this interactive online course we will define phishing and identify common features, examples, and how to avoid phishing scams. We will also discuss identity theft and how to protect against it.

Learning Objectives

By the end of this course, you will be able to:

  • Define phishing
  • Identify common features and examples of phishing
  • Describe how to avoid phishing scams
  • Define spear phishing
  • Describe how to avoid spear phishing scams
  • Select the best advice when using social media
  • Categorize the two forms of identity theft
  • List common examples of identity theft
  • Describe how to protect against identity theft

Duration: 0.25 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

A large number of cyber attacks target browser activity. This course provides all staff members with an overview of browser security and ways to browse the web safely. Topics include: the types of browser threats, the basics of browser security and safe browsing practices.

Learning Objectives

By the end of this course, you will be able to:

  • Types of browser trends
  • Browser security basics
  • Safe browsing practices

Duration: 0.25 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

The convenience of web access makes it easy to forget that we need to protect and care for our information. This introductory course provides an overview of cybercrime and cybersecurity, including the basics of cybersecurity along with the effects of cybercrime, the types of cyber threats and how users are susceptible.

Learning Objectives

By the end of this course, you will be able to:

  • The effects of cybercrime
  • The types of threats
  • How we are susceptible
  • The basics of cybersecurity

Duration: 0.25 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

Email is the primary means of attack from cyber-perpetrators. This course provides an overview of cybercrime via email, and how to employ safe email and messaging practices to avoid and help prevent cyber threats, attempts at fraud and identity theft.

Learning Objectives

By the end of this course, you will be able to:

  • How email threats operate
  • How to identify email fraud and phishing
  • Safe email and messaging practices

Duration: 0.25 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

This course provides an overview of password security and management, including the basic principles of password security, the elements of a strong password, and strategies of how to create and maintain passwords.

Learning Objectives

By the end of this course, you will be able to:

  • Basics of password security
  • Elements of a strong password
  • How to create and maintain passwords

Duration: 0.25 Hrs

Course Level: Fundamental
Languages: English
Capability: Audio, Video, MobileReady

Malware is a primary means of attack for cyber-perpetrators. This course provides staff members with an overview of basic protection against malware. Topics include: the types of malware, how malware works and protective strategies

Learning Objectives

By the end of this course, you will be able to:

  • Types of malware threats
  • How malware works
  • Strategies for Protection
  • Safe practices