Session One: Course Overview
Course Overview
Learning Objectives
Pre-Assignment
Pre-Course Assessment
Session Two: The State of Cybercrime
History of Cybercrime
Recalling Cybercrimes
Historical Examples of Cybercrime
Cost of Cybercrime
Session Three: Types of Cyberattacks
Types of Attacks
Session Four: Role of Human Error
The Role of Human Error
Opening Email
Session Five: What Can a Company Do?
Company-wide Defenses
Other Company-wide Defenses
Focus on Social Media
Create a Social Media Policy
Session Six: Best Practices for Remote or Travelling Employees
Out of Office Protections
Session Seven: Scenarios
Scenario: Malware
Scenario: Potential Data Breach
Session Eight: Cyberattacks on Individuals
Cyberattacks to Obtain Sensitive Information
Malware (Malicious Software)
Social Media
Social Media Scams
Session Nine: Recognizing Phishing Attacks
The Giveaway Clues to Phishing Attacks
Spot the Clue
Phishing Emails
Session Ten: What Can a Person Do?
Supporting Company Efforts
Social Media
Focus on Spear Phishing
How to Protect the Organization
Social Media Safety
Session Eleven: Creating a Personal Cybersecurity Plan
Cybersecurity Starts with You!
Personal Action Plan
Course Summary
Recommended Reading List
Post-Course Assessment
Pre- and Post-Course Assessment Answer Key
Pre-Course Assessment
Post-Course Assessment
Assignment Answer Key
Session Three: Types of Cyberattacks
Session Four: Role of Human Error
Session Five: What Can a Company Do?
Session Six: Best Practices for Remote or Travelling Employees
Session Seven: Scenarios
Session Eight: Cyberattacks on Individuals
Session Nine: Recognizing Phishing Attacks
Spot the Clue
Complete the form below and we'll email you an evaluation copy of this course: