Cyber Security Awareness for Managers
Ensure your team and business are protected by educating yourself in cyber security matters. Learn how to prevent and respond to cyber security incidents.
Cybercrime is reported on average once every 7 minutes
Human error accounts for 95% of cyber attacks
Cyber security training is an effective defense against attacks
Email scams are among the most financially damaging online crimes
1.1 Course Agreement
1.2 Cyber Security Terms
2.1 What is Cyber Attack?
2.2 Weaknesses That Lead to Cyber Attack
2.3 What is Cyber security?
2.4 What is Cyber Hygiene?
2.5 The Golden Triangle of Cyber Security
2.6 Emerging Risks
2.7 Quiz
3.1 Objectives of Cyber Security Practices
3.2 Confidentiality
3.3 Integrity
3.4 Availability
3.5 Quiz
4.1 Common Cyber Attacks
4.2 Password Attack
4.3 Time It Takes To Hack Your Password
4.4 Man-in-the-middle (MitM)
4.5 Botnet
4.6 Malware
4.7 Phishing
4.8 Distributed Denial of Service
4.9 Quiz
5.1 Cyber Hygiene
5.2 Micro-segmentation
5.3 Encryption
5.4 Patching
5.5 Strong Password Management
5.6 Phishing Detection
5.7 Regular Data Backup
5.8 Detecting and Removing Malware
5.9 Identify the Risk - Learning Activity
5.10 Quiz
6.1 Human Factor in Cyber Security
6.2 Social Engineering
6.3 Insider Threat
6.4 Lack of Training
6.5 Weak Passwords
6.6 Third-Party Risks
6.7 Human Error
6.8 Fatigue
6.9 Cyber Security Fatigue
6.10 Quiz
7.1 Mitigating the Human Factor
7.2 Regular Security Awareness Training
7.3 Least Privilege Access
7.4 Screen Outside Vendors
7.5. Implementing Cyber Security Tools
7.6 Password Management
7.7 Manage Fatigue
7.8 Manage Cyber Security Fatigue
7.9 User Behaviour Analytics
7.10 Regular Cyber Security Audits
7.11 Cyber Security Policies & Procedures
7.12 Quiz
8.1 Benefits of Strong Password Management
8.2 Mitigating Password Threats
8.3 Multi-Factor Authentication
8.4 Changing Passwords Frequently
8.5 Using a Password Manager
8.6 Using a Long Passphrases
8.7 Using Different Passwords for Different Accounts
8.8 Quiz
9.1 What is a Cyber Incident Response Plan?
9.2 Why Every Business Needs a Cyber IRP
9.3 Phases of a Cyber IRP
9.4 Case Study
9.5 Quiz
10.1 Cyber Security: Small Business, Big Threat