Cybersecurity 1: Fundamentals for Employees explores the world of cybercrime. This one-day course will ensure that staff gain an appreciation of company-wide measures to protect against cyberattacks and their own role in the success of these defense measures.
Most importantly, it will help staff recognize phishing attacks and understand what steps to take to mitigate the effect when a cyberattack has been successful. It emphasizes the importance of practicing safe social media behavior to prevent cyber criminals from mining sensitive personal and company data.
Each participant leaves with their own personal cybersecurity plan that prepares them to enter the fight against cybercrime.
Session One: Course Overview
Course Overview
Learning Objectives
Pre-Assignment
Pre-Course Assessment
Session Two: The State of Cybercrime
History of Cybercrime
Recalling Cybercrimes
Historical Examples of Cybercrime
Cost of Cybercrime
Session Three: Types of Cyberattacks
Types of Attacks
Session Four: Role of Human Error
The Role of Human Error
Opening Email
Session Five: What Can a Company Do?
Company-wide Defenses
Other Company-wide Defenses
Focus on Social Media
Create a Social Media Policy
Session Six: Best Practices for Remote or Travelling Employees
Out of Office Protections
Session Seven: Scenarios
Scenario: Malware
Scenario: Potential Data Breach
Session Eight: Cyberattacks on Individuals
Cyberattacks to Obtain Sensitive Information
Malware (Malicious Software)
Social Media
Social Media Scams
Session Nine: Recognizing Phishing Attacks
The Giveaway Clues to Phishing Attacks
Spot the Clue
Phishing Emails
Session Ten: What Can a Person Do?
Supporting Company Efforts
Social Media
Focus on Spear Phishing
How to Protect the Organization
Social Media Safety
Session Eleven: Creating a Personal Cybersecurity Plan
Cybersecurity Starts with You!
Personal Action Plan
Course Summary
Recommended Reading List
Post-Course Assessment
Pre- and Post-Course Assessment Answer Key
Pre-Course Assessment
Post-Course Assessment
Assignment Answer Key
Session Three: Types of Cyberattacks
Session Four: Role of Human Error
Session Five: What Can a Company Do?
Session Six: Best Practices for Remote or Travelling Employees
Session Seven: Scenarios
Session Eight: Cyberattacks on Individuals
Session Nine: Recognizing Phishing Attacks
Spot the Clue
Everything you need to deliver amazing training
Each courseware title is a trainers' kit that comes with the following course components:
Instructor Guide
Velsoft Instructor Guides are the core of each training course. Our Instructor Guides lay out the training in simple, easy-to-follow instructions. You can also customize the Instructor Guides in order to personalize your training.
Student Manual
Each Instructor Guide - for each course - is paired with a Student Manual that you can present to your participants. This customizable Student Manual gives each participant the ?student? version of the course you will be teaching.
PowerPoint Deck
Courseware from Velsoft is designed to give you everything you need for use in the classroom or for your workshop. This includes the PowerPoint versions of all the courses, prepared for you in advance.
Quick Reference Guide
Quick Reference Guides are a favorite tool for trainers to provide to their learners. Each Quick Reference Guide summarizes the most important elements in each courseware title down to two pages.