This courseware is available in a Virtual Classroom configuration.

Security Awareness Training

Despite the best efforts of organizations worldwide, cybercrime is rising rapidly, and it is expected to cost organizations a stunning amount in 2019: $2 trillion….

Certificate None
Duration Optional 45/25 minutes
Delivery Online
Accreditor
Languages English

What is included in Security Awareness Training

Course Description

Despite the best efforts of organizations worldwide, cybercrime is rising rapidly, and it is expected to cost organizations a stunning amount in 2019: $2 trillion. This is because human error continues to be the biggest threat to information security. This course aims to mitigate human error by teaching how to:

  • Classify data
  • Protect confidential/sensitive data
  • Secure mobile devices
  • Secure remote and home offices
  • Avoid social engineering scams like pretexting and phishing, and
  • Create strong passwords

The course aims to maximize learning by using a challenge-based approach that helps user
understand the best practices they should follow in office every day.

Users are frequently asked to resolve common challenges that employees face every day – everything from recognizing the classification level of sensitive files to recognizing phishing and other social engineering attempts.

Course Information

Certification: None

Duration: Optional 45/25 minutes

Domain: Information Management

Delivery Method: Online

Accreditor:

Available Languages: English

Purchase Options: Pay Per Use Courseware

Audience

Information Security Officer

Learning Objectives

At the end of this course, you will be able to:

  • Classify data: You will be able to determine which classification a given piece of data

falls under – confidential, restricted, or public.

  • Protect confidential/sensitive data: You will learn the steps you need to take to ensure

that data is only shared with relevant people and that data remains secure from hackers

and in public places.

  • Secure mobile devices: You will learn the steps you need to take to protect the data

stored in mobile devices.

  • Secure remote and home offices: You will be able to secure organizational data at

your home/remote office by learning how to configure your router and other network

devices – and the general best practices to follow when working away from the office.

  • Avoid social engineering scams: You will be able to define, recognize, and avoid

social engineering scams such as phishing, pretexting, baiting, and quid pro quo.

  • Create strong passwords: You will be able to create strong passwords – and the

general best practices to take in regards to passwords.

Course Outline

 

Module 1: Information Security

  • Responsibilities
  • Policies & Practices
  • Personal Use
  • Security Incidents

 

Module 2: Social Engineering

  • Types of Social Engineering
  • Avoiding Social Engineering

 

Module 3: Internet Safety

  • Consequences & Prevention

 

Module 4: Email Safety

  • Email Best Practices

 

Module 5: Access Control & Passwords

  • Responsibility
  • Prevention
  • Creating Strong Passwords

Module 6: Identity Theft

  • Prevention

Module 7: Physical Security

  • Securing mobile devices

Delivery is subject to Leapest terms and conditions.

Benefits of Working with ITpreneurs

Ready-to-use training materials means faster time to revenue. Offer relevant training to your clients: order accredited training materials, book exams, and drive results.

icons8-new-100

Innovative Solutions

We continue to innovate our portfolio. We offer blended learning programs, video-based learning as well as interactive learning tracks.

icons8-easy-100

Convenience

An intuitive ordering process and fully automated delivery portal that integrates with your own delivery processes make your life easy.

icons8-training-100

Instructor Support

You get extensive guidance for instructors, ensuring optimal deliveries, every time. Don’t have an instructor? Use one of ours!

icons8-address-book-2-100

Branded Products

Our printed books, ebooks, or printable books are branded with your logo and name. Your customers will log into your branded portal.

icons8-puzzle-100 (1)

Tailored Portfolio

You get various flavors of courseware, ensuring there always is an option that suits your needs.

icons8-shopping-cart-100

Click and Consume

A flexible pay-per-use model for courseware, exams and instructors offers you full flexibility instantly.

Triangle Left

Partner with ITpreneurs for Security Awareness Training

Interested in licensing our courseware for your training organization or corporate training environment?